FreeBSD : asterisk -- Exploitable Stack Buffer Overflow (5ab9fb2a-23a5-11e0-a835-0003ba02bf30)

High Nessus Plugin ID 51582


The remote FreeBSD host is missing one or more security-related updates.


The Asterisk Development Team reports :

The releases of Asterisk,,,,,, and resolve an issue when forming an outgoing SIP request while in pedantic mode, which can cause a stack buffer to be made to overflow if supplied with carefully crafted caller ID information. The issue and resolution are described in the AST-2011-001 security advisory.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 51582

File Name: freebsd_pkg_5ab9fb2a23a511e0a8350003ba02bf30.nasl

Version: $Revision: 1.8 $

Type: local

Published: 2011/01/20

Modified: 2015/05/13

Dependencies: 12634

Risk Information

Risk Factor: High

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:asterisk14, p-cpe:/a:freebsd:freebsd:asterisk16, p-cpe:/a:freebsd:freebsd:asterisk18, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2011/01/19

Vulnerability Publication Date: 2011/01/18