FreeBSD : asterisk -- multiple vulnerabilities (daf0a339-9850-11e2-879e-d43d7e0c7c02)

High Nessus Plugin ID 65852

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Asterisk project reports :

Buffer Overflow Exploit Through SIP SDP Header

Username disclosure in SIP channel driver

Denial of Service in HTTP server

Solution

Update the affected packages.

See Also

http://downloads.asterisk.org/pub/security/AST-2013-001.html

http://downloads.asterisk.org/pub/security/AST-2013-002.html

http://downloads.asterisk.org/pub/security/AST-2013-003.html

https://www.asterisk.org/downloads/security-advisories

http://www.nessus.org/u?75374b7e

Plugin Details

Severity: High

ID: 65852

File Name: freebsd_pkg_daf0a339985011e2879ed43d7e0c7c02.nasl

Version: 1.11

Type: local

Published: 2013/04/08

Updated: 2018/12/19

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:asterisk10, p-cpe:/a:freebsd:freebsd:asterisk11, p-cpe:/a:freebsd:freebsd:asterisk18, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2013/03/29

Vulnerability Publication Date: 2013/03/27

Reference Information

CVE: CVE-2013-2264, CVE-2013-2685, CVE-2013-2686