Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
FreeBSD Ports: asterisk18
Information
Severity
Severity
Medium
Family
Family
FreeBSD Local Security Checks
CVSSv2 Base
CVSSv2 Base
6.8
CVSSv2 Vector
CVSSv2 Vector
AV:N/AC:L/Au:S/C:N/I:N/A:C
Solution Type
Solution Type
Vendor Patch
Created
Created
12 years ago
Modified
Modified
5 years ago
Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Insight
Insight
The following packages are affected: asterisk18 asterisk CVE-2011-4063 chan_sip.c in the SIP channel driver in Asterisk Open Source 1.8.x before 1.8.7.1 and 10.x before 10.0.0-rc1 does not properly initialize variables during request parsing, which allows remote authenticated users to cause a denial of service (daemon crash) via a malformed request.
Solution
Solution
Update your system with the appropriate patches or software upgrades.