Asterisk Multiple Vulnerabilities (AST-2011-005/AST-2011-006)

medium Nessus Network Monitor Plugin ID 5897

Synopsis

The remote VoIP server is vulnerable to multiple attack vectors.

Description

The version of Asterisk running on the remote host is potentially affected by multiple issues :

- On systems that have the Asterisk Manager interface, Skinny, SIP over TCP, or the built in HTTP server enabled, it is possible for an attacker to open as many connections to asterisk as he wishes which would cause Asterisk to run out of available file descriptors and stop processing any new calls. (AST-2011-005)

- It is possible to bypass a security check and execute shell commands when they should not have that ability. Note that only users with the 'system' privileges should be able to do this. (AST-2011-006)

Solution

Upgrade to Asterisk 1.4.40.1, 1.6.1.25, 1.6.2.17.3, 1.8.3.3, Business Edition C.3.6.4, or later.

See Also

http://downloads.asterisk.org/pub/security/AST-2011-005.html

http://downloads.asterisk.org/pub/security/AST-2011-006.html

Plugin Details

Severity: Medium

ID: 5897

Family: Generic

Published: 4/25/2011

Updated: 3/6/2019

Nessus ID: 53544

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.4

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 6.3

Temporal Score: 5.9

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:digium:asterisk

Patch Publication Date: 4/21/2011

Vulnerability Publication Date: 4/21/2011

Reference Information

CVE: CVE-2011-1507, CVE-2011-1599

BID: 47537