Asterisk Remote Crash Vulnerability in voice mail application (AST-2012-011)

low Nessus Network Monitor Plugin ID 6511

Synopsis

The remote VoIP server is vulnerable to a denial of service attack.

Description

According to the version in its SIP banner, the version of Asterisk running on the remote host is potentially affected by a vulnerability that could allow a remote attacker to crash the server. If a single voicemail account is manipulated by two parties simultaneously, a condition can occur where memory is freed twice causing a crash.

Solution

Upgrade to Asterisk 1.8.13.1 / 10.5.2

See Also

http://downloads.asterisk.org/pub/security/AST-2012-011.html

http://www.securityfocus.com/bid/54317/info

Plugin Details

Severity: Low

ID: 6511

Family: Generic

Published: 7/9/2011

Updated: 3/6/2019

Nessus ID: 60065

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Low

Base Score: 3.5

Temporal Score: 2.6

Vector: CVSS2#AV:N/AC:M/Au:S/C:N/I:N/A:P

CVSS v3

Risk Factor: Low

Base Score: 3.1

Temporal Score: 2.7

Vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:digium:asterisk

Patch Publication Date: 7/5/2011

Vulnerability Publication Date: 7/5/2011

Reference Information

CVE: CVE-2012-3812

BID: 54317