FreeBSD : Vulnerabilities in H.323 implementations (27c331d5-64c7-11d8-80e3-0020ed76ef5a)

Critical Nessus Plugin ID 37542


The remote FreeBSD host is missing one or more security-related updates.


The NISCC and the OUSPG developed a test suite for the H.323 protocol.
This test suite has uncovered vulnerabilities in several H.323 implementations with impacts ranging from denial-of-service to arbitrary code execution.

In the FreeBSD Ports Collection, `pwlib' is directly affected. Other applications such as `asterisk' and `openh323' incorporate `pwlib' statically and so are also independently affected.


Update the affected packages.

See Also

Plugin Details

Severity: Critical

ID: 37542

File Name: freebsd_pkg_27c331d564c711d880e30020ed76ef5a.nasl

Version: $Revision: 1.11 $

Type: local

Published: 2009/04/23

Modified: 2013/08/09

Dependencies: 12634

Risk Information

Risk Factor: Critical


Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:asterisk, p-cpe:/a:freebsd:freebsd:openh323, p-cpe:/a:freebsd:freebsd:pwlib, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2004/02/22

Vulnerability Publication Date: 2004/01/13

Reference Information

CVE: CVE-2004-0097

CERT-CC: CA-2004-01

CERT: 749342