FreeBSD : asterisk -- Remote Crash Vulnerability in WebSocket Server (94268da0-8118-11e4-a180-001999f8d30b)

Medium Nessus Plugin ID 79956


The remote FreeBSD host is missing a security-related update.


The Asterisk project reports :

When handling a WebSocket frame the res_http_websocket module dynamically changes the size of the memory used to allow the provided payload to fit. If a payload length of zero was received the code would incorrectly attempt to resize to zero. This operation would succeed and end up freeing the memory but be treated as a failure.
When the session was subsequently torn down this memory would get freed yet again causing a crash.

Users of the WebSocket functionality also did not take into account that provided text frames are not guaranteed to be NULL terminated.
This has been fixed in chan_sip and chan_pjsip in the applicable versions.


Update the affected package.

See Also

Plugin Details

Severity: Medium

ID: 79956

File Name: freebsd_pkg_94268da0811811e4a180001999f8d30b.nasl

Version: $Revision: 1.2 $

Type: local

Published: 2014/12/15

Modified: 2015/01/30

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:asterisk11, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2014/12/11

Vulnerability Publication Date: 2014/10/30

Reference Information

CVE: CVE-2014-9374