FreeBSD : asterisk -- Exploitable Stack and Heap Array Overflows (65d16342-3ec8-11e0-9df7-001c42d23634)

high Nessus Plugin ID 52058

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

The Asterisk Development Team reports :

The releases of Asterisk 1.4.39.2, 1.6.1.22, 1.6.2.16.2, and 1.8.2.4 resolve an issue that when decoding UDPTL packets, multiple heap based arrays can be made to overflow by specially crafted packets. Systems configured for T.38 pass through or termination are vulnerable. The issue and resolution are described in the AST-2011-002 security advisory.

Solution

Update the affected packages.

See Also

http://downloads.asterisk.org/pub/security/AST-2011-002.html

http://www.nessus.org/u?5cac1407

Plugin Details

Severity: High

ID: 52058

File Name: freebsd_pkg_65d163423ec811e09df7001c42d23634.nasl

Version: 1.11

Type: local

Published: 2/23/2011

Updated: 1/6/2021

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:asterisk14, p-cpe:/a:freebsd:freebsd:asterisk16, p-cpe:/a:freebsd:freebsd:asterisk18, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2/22/2011

Vulnerability Publication Date: 2/21/2011

Reference Information

Secunia: 43429