FreeBSD : asterisk -- multiple vulnerabilities (daf0a339-9850-11e2-879e-d43d7e0c7c02)

high Nessus Plugin ID 65852

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Asterisk project reports :

Buffer Overflow Exploit Through SIP SDP Header

Username disclosure in SIP channel driver

Denial of Service in HTTP server

Solution

Update the affected packages.

See Also

http://downloads.asterisk.org/pub/security/AST-2013-001.html

http://downloads.asterisk.org/pub/security/AST-2013-002.html

http://downloads.asterisk.org/pub/security/AST-2013-003.html

https://www.asterisk.org/downloads/security-advisories

http://www.nessus.org/u?75374b7e

Plugin Details

Severity: High

ID: 65852

File Name: freebsd_pkg_daf0a339985011e2879ed43d7e0c7c02.nasl

Version: 1.13

Type: local

Published: 4/8/2013

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:asterisk10, p-cpe:/a:freebsd:freebsd:asterisk11, p-cpe:/a:freebsd:freebsd:asterisk18, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 3/29/2013

Vulnerability Publication Date: 3/27/2013

Reference Information

CVE: CVE-2013-2264, CVE-2013-2685, CVE-2013-2686