![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.70579 |
Category: | Debian Local Security Checks |
Title: | Debian: Security Advisory (DSA-2367-1) |
Summary: | The remote host is missing an update for the Debian 'asterisk' package(s) announced via the DSA-2367-1 advisory. |
Description: | Summary: The remote host is missing an update for the Debian 'asterisk' package(s) announced via the DSA-2367-1 advisory. Vulnerability Insight: Several vulnerabilities have been discovered in Asterisk, an Open Source PBX and telephony toolkit: CVE-2011-4597 Ben Williams discovered that it was possible to enumerate SIP user names in some configurations. Please see the upstream advisory for details. This update only modifies the sample sip.conf configuration file. Please see README.Debian for more information on how to update your installation. CVE-2011-4598 Kristijan Vrban discovered that Asterisk can be crashed with malformed SIP packets if the automon feature is enabled. For the oldstable distribution (lenny), this problem has been fixed in version 1:1.4.21.2~ dfsg-3+lenny6. For the stable distribution (squeeze), this problem has been fixed in version 1:1.6.2.9-2+squeeze4. For the unstable distribution (sid), this problem has been fixed in version 1:1.8.8.0~ dfsg-1. We recommend that you upgrade your asterisk packages. Affected Software/OS: 'asterisk' package(s) on Debian 5, Debian 6. Solution: Please install the updated package(s). CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2011-4597 20111222 Exploit for Asterisk Security Advisory AST-2011-013 http://archives.neohapsis.com/archives/bugtraq/2011-12/0151.html 47273 http://secunia.com/advisories/47273 77597 http://osvdb.org/77597 DSA-2367 http://www.debian.org/security/2011/dsa-2367 [asterisk-dev] 20111108 Summary: SIP, NAT, security concerns, oh my! http://lists.digium.com/pipermail/asterisk-dev/2011-November/052191.html [oss-security] 20111209 CVE Request -- Asterisk -- AST-2011-013 and AST-2011-014 http://openwall.com/lists/oss-security/2011/12/09/3 [oss-security] 20111209 Re: CVE Request -- Asterisk -- AST-2011-013 and AST-2011-014 http://openwall.com/lists/oss-security/2011/12/09/4 http://downloads.asterisk.org/pub/security/AST-2011-013.html Common Vulnerability Exposure (CVE) ID: CVE-2011-4598 77598 http://osvdb.org/77598 http://downloads.asterisk.org/pub/security/AST-2011-014.html |
Copyright | Copyright (C) 2012 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |