FreeBSD : asterisk -- Mitigation for libcURL HTTP request injection vulnerability (7656fc62-a7a7-11e4-96ba-001999f8d30b)

High Nessus Plugin ID 81097


The remote FreeBSD host is missing one or more security-related updates.


The Asterisk project reports :

CVE-2014-8150 reported an HTTP request injection vulnerability in libcURL. Asterisk uses libcURL in its module (the CURL() dialplan function), as well as its (cURL realtime backend) modules.

Since Asterisk may be configured to allow for user-supplied URLs to be passed to libcURL, it is possible that an attacker could use Asterisk as an attack vector to inject unauthorized HTTP requests if the version of libcURL installed on the Asterisk server is affected by CVE-2014-8150.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 81097

File Name: freebsd_pkg_7656fc62a7a711e496ba001999f8d30b.nasl

Version: $Revision: 1.1 $

Type: local

Published: 2015/01/30

Modified: 2015/01/30

Dependencies: 12634

Risk Information

Risk Factor: High

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:asterisk, p-cpe:/a:freebsd:freebsd:asterisk11, p-cpe:/a:freebsd:freebsd:asterisk13, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2015/01/29

Vulnerability Publication Date: 2015/01/12