This script is Copyright (C) 2016 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
The Asterisk project reports :
Asterisk can be crashed remotely by sending an ACK to it from an
endpoint username that Asterisk does not recognize. Most SIP request
types result in an 'artificial' endpoint being looked up, but ACKs
bypass this lookup. The resulting NULL pointer results in a crash when
attempting to determine if ACLs should be applied.
This issue was introduced in the Asterisk 13.10 release and only
affects that release.
This issue only affects users using the PJSIP stack with Asterisk.
Those users that use chan_sip are unaffected.
See also :
Update the affected package.
Risk factor :
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now