This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.
A telephony application running on the remote host is affected by a
denial of service vulnerability.
According to the version in its SIP banner, the version of Asterisk
running on the remote host is potentially affected by a double-free
error related to the 'res_http_websocket' module and handling of
zero-length payloads that could allow denial of service attacks.
Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.
See also :
Upgrade to Asterisk 11.14.2 / 12.7.2 / 13.0.2 / 11.6-cert9 or apply
the appropriate patch listed in the Asterisk advisory.
Alternatively, as a workaround, disable the built-in HTTP server.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.7
Public Exploit Available : true