FreeBSD : sterisk -- multiple vulnerabilities (8dd438ed-a338-11ed-b48b-589cfc0f81b0)

medium Nessus Plugin ID 170965



The remote FreeBSD host is missing one or more security-related updates.


The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the 8dd438ed-a338-11ed-b48b-589cfc0f81b0 advisory.

- In Sangoma Asterisk through 16.28.0, 17.x and 18.x through 18.14.0, and 19.x through 19.6.0, an incoming Setup message to addons/ooh323c/src/ooq931.c with a malformed Calling or Called Party IE can cause a crash. (CVE-2022-37325)

- A use-after-free in res_pjsip_pubsub.c in Sangoma Asterisk 16.28, 18.14, 19.6, and certified/18.9-cert2 may allow a remote authenticated attacker to crash Asterisk (denial of service) by performing activity on a subscription via a reliable transport at the same time that Asterisk is also performing activity on that subscription. (CVE-2022-42705)

- An issue was discovered in Sangoma Asterisk through 16.28, 17 and 18 through 18.14, 19 through 19.6, and certified through 18.9-cert1. GetConfig, via Asterisk Manager Interface, allows a connected application to access files outside of the asterisk configuration directory, aka Directory Traversal. (CVE-2022-42706)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.


Update the affected packages.

See Also

Plugin Details

Severity: Medium

ID: 170965

File Name: freebsd_pkg_8dd438eda33811edb48b589cfc0f81b0.nasl

Version: 1.0

Type: local

Published: 2/2/2023

Updated: 2/2/2023

Risk Information


Risk Factor: Medium

Score: 4.4


Risk Factor: Medium

Base Score: 6.1

Temporal Score: 4.5

Vector: AV:N/AC:L/Au:M/C:C/I:N/A:N

Temporal Vector: E:U/RL:OF/RC:C

CVSS Score Source: CVE-2022-42706


Risk Factor: Medium

Base Score: 4.9

Temporal Score: 4.3

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:asterisk18, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 2/2/2023

Vulnerability Publication Date: 12/5/2022

Reference Information

CVE: CVE-2022-37325, CVE-2022-42705, CVE-2022-42706