Fedora 14 : asterisk- (2011-3942)

Medium Nessus Plugin ID 53242


The remote Fedora host is missing a security update.


The Asterisk Development Team has announced security releases for Asterisk branches 1.6.1, 1.6.2, and 1.8. The available security releases are released as versions,, and
These releases are available for immediate download at http://downloads.asterisk.org/pub/telephony/asterisk/releases ** This is a re-release of Asterisk, and which contained a bug which caused duplicate manager entries (issue #18987).
The releases of Asterisk,, and resolve two issues :

- Resource exhaustion in Asterisk Manager Interface (AST-2011-003)

- Remote crash vulnerability in TCP/TLS server (AST-2011-004) The issues and resolutions are described in the AST-2011-003 and AST-2011-004 security advisories. For more information about the details of these vulnerabilities, please read the security advisories AST-2011-003 and AST-2011-004, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLog:
http://downloads.asterisk.org/pub/telephony/asterisk/r eleases/ChangeLog- http://downloads.asterisk.org/pub/telephony/asterisk/r eleases/ChangeLog- http://downloads.asterisk.org/pub/telephony/asterisk/r eleases/ChangeLog- Security advisory AST-2011-003 and AST-2011-004 are available at:
http://downloads.asterisk.org/pub/security/AST-2011-00 3.pdf http://downloads.asterisk.org/pub/security/AST-2011-00 4.pdf

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected asterisk package.

See Also










Plugin Details

Severity: Medium

ID: 53242

File Name: fedora_2011-3942.nasl

Version: $Revision: 1.9 $

Type: local

Agent: unix

Published: 2011/04/01

Modified: 2016/05/11

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:asterisk, cpe:/o:fedoraproject:fedora:14

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2011/03/23

Reference Information

CVE: CVE-2011-1174, CVE-2011-1175

BID: 46897, 46898

FEDORA: 2011-3942