FreeBSD : asterisk -- Exploitable Stack and Heap Array Overflows (65d16342-3ec8-11e0-9df7-001c42d23634)

High Nessus Plugin ID 52058


The remote FreeBSD host is missing one or more security-related updates.


The Asterisk Development Team reports :

The releases of Asterisk,,, and resolve an issue that when decoding UDPTL packets, multiple heap based arrays can be made to overflow by specially crafted packets. Systems configured for T.38 pass through or termination are vulnerable. The issue and resolution are described in the AST-2011-002 security advisory.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 52058

File Name: freebsd_pkg_65d163423ec811e09df7001c42d23634.nasl

Version: $Revision: 1.8 $

Type: local

Published: 2011/02/23

Modified: 2015/05/13

Dependencies: 12634

Risk Information

Risk Factor: High

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:asterisk14, p-cpe:/a:freebsd:freebsd:asterisk16, p-cpe:/a:freebsd:freebsd:asterisk18, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2011/02/22

Vulnerability Publication Date: 2011/02/21

Reference Information

Secunia: 43429