FreeBSD : asterisk -- Buffer overflow in CDR's set user (356b02e9-1954-11e7-9608-001999f8d30b)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

The Asterisk project reports :

No size checking is done when setting the user field on a CDR. Thus,
it is possible for someone to use an arbitrarily large string and
write past the end of the user field storage buffer. This allows the
possibility of remote code injection.

See also :

http://downloads.asterisk.org/pub/security/AST-2017-001.html
https://issues.asterisk.org/jira/browse/ASTERISK-26897
http://www.nessus.org/u?9eff3de8

Solution :

Update the affected package.

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 99192 ()

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now