![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.107148 |
Kategorie: | Denial of Service |
Titel: | Asterisk Open Source and Certified Asterisk RTP Resource Exhaustion DoS Vulnerability |
Zusammenfassung: | Asterisk Open Source and Certified Asterisk are prone to a; remote denial of service (DoS) vulnerability.;; This VT has been deprecated since this check is already covered in 'Asterisk RTP Resource; Exhaustion Vulnerability' (OID: 1.3.6.1.4.1.25623.1.0.106239). |
Beschreibung: | Summary: Asterisk Open Source and Certified Asterisk are prone to a remote denial of service (DoS) vulnerability. This VT has been deprecated since this check is already covered in 'Asterisk RTP Resource Exhaustion Vulnerability' (OID: 1.3.6.1.4.1.25623.1.0.106239). Vulnerability Insight: The overlap dialing feature in chan_sip allows chan_sip to report to a device that the number that has been dialed is incomplete and more digits are required. If this functionality is used with a device that has performed username/password authentication RTP resources are leaked. This occurs because the code fails to release the old RTP resources before allocating new ones in this scenario. If all resources are used then RTP port exhaustion will occur and no RTP sessions are able to be set up. Vulnerability Impact: An attacker can exploit this issue to cause a denial-of-service condition. Affected Software/OS: The following products and versions are vulnerable: Digium Asterisk 13 before 13.11.1 Digium Asterisk 11 before 11.23.1 Digium Certified Asterisk 13 before 13.8-cert3 Digium Certified Asterisk 11 before 11.6-cert1 Solution: Updates are available. Please see the references or vendor advisory for more information. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-7551 Debian Security Information: DSA-3700 (Google Search) http://www.debian.org/security/2016/dsa-3700 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838832 https://issues.asterisk.org/jira/browse/ASTERISK-26272 |
Copyright | Copyright (C) 2017 Greenbone AG |
Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |