Asterisk SRTP Video Stream Negotiation Remote Crash (AST-2012-001)
2012-03-22T00:00:00
ID ASTERISK_AST_2012_001.NASL Type nessus Reporter This script is Copyright (C) 2012-2018 Tenable Network Security, Inc. Modified 2021-02-02T00:00:00
Description
According to the version in its SIP banner, the version of Asterisk
running on the remote host is potentially affected by a vulnerability
that could allow a remote attacker to crash the server. The
vulnerability can be triggered by attempting to negotiate a secure
video stream when it has not been enabled and the res_srtp Asterisk
module is loaded.
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(58431);
script_version("1.12");
script_cvs_date("Date: 2018/06/27 18:42:26");
script_cve_id("CVE-2012-0885");
script_bugtraq_id(51581);
script_name(english:"Asterisk SRTP Video Stream Negotiation Remote Crash (AST-2012-001)");
script_summary(english:"Checks version in SIP banner");
script_set_attribute(
attribute:"synopsis",
value:
"A telephony application running on the remote host is affected by a
denial of service vulnerability."
);
script_set_attribute(
attribute:"description",
value:
"According to the version in its SIP banner, the version of Asterisk
running on the remote host is potentially affected by a vulnerability
that could allow a remote attacker to crash the server. The
vulnerability can be triggered by attempting to negotiate a secure
video stream when it has not been enabled and the res_srtp Asterisk
module is loaded."
);
script_set_attribute(attribute:"see_also", value:"http://downloads.asterisk.org/pub/security/AST-2012-001.html");
script_set_attribute(
attribute:"solution",
value:
"Upgrade to Asterisk 1.8.8.2 / 10.0.1 or apply the patches listed in
the Asterisk advisory."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2012/01/19");
script_set_attribute(attribute:"patch_publication_date", value:"2012/01/19");
script_set_attribute(attribute:"plugin_publication_date", value:"2012/03/22");
script_set_attribute(attribute:"potential_vulnerability", value:"true");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:digium:asterisk");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Misc.");
script_copyright(english:"This script is Copyright (C) 2012-2018 Tenable Network Security, Inc.");
script_dependencies("asterisk_detection.nasl");
script_require_keys("asterisk/sip_detected", "Settings/ParanoidReport");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
get_kb_item_or_exit("asterisk/sip_detected");
# see if we were able to get version info from the Asterisk SIP services
asterisk_kbs = get_kb_list("sip/asterisk/*/version");
if (isnull(asterisk_kbs)) exit(1, "Could not obtain any version information from the Asterisk SIP instance(s).");
# Prevent potential false positives.
if (report_paranoia < 2) audit(AUDIT_PARANOID);
is_vuln = FALSE;
not_vuln_installs = make_list();
errors = make_list();
foreach kb_name (keys(asterisk_kbs))
{
vulnerable = 0;
matches = eregmatch(pattern:"/(udp|tcp)/([0-9]+)/version", string:kb_name);
if (isnull(matches))
{
errors = make_list(errors, "Unexpected error parsing port number from kb name: "+kb_name);
continue;
}
proto = matches[1];
port = matches[2];
version = asterisk_kbs[kb_name];
if (version == 'unknown')
{
errors = make_list(errors, "Unable to obtain version of install on " + proto + "/" + port);
continue;
}
banner = get_kb_item("sip/asterisk/" + proto + "/" + port + "/source");
if (!banner)
{
# We have version but banner is missing; log error
# and use in version-check though.
errors = make_list(errors, "KB item 'sip/asterisk/" + proto + "/" + port + "/source' is missing");
banner = 'unknown';
}
if (version =~ "^1\.8([^0-9]|$)")
{
fixed = "1.8.8.2";
vulnerable = ver_compare(ver:version, fix:fixed, app:"asterisk");
}
else if (version =~ "^10([^0-9]|$)")
{
fixed = "10.0.1";
vulnerable = ver_compare(ver:version, fix:fixed, app:"asterisk");
}
if (vulnerable < 0)
{
is_vuln = TRUE;
if (report_verbosity > 0)
{
report =
'\n Version source : ' + banner +
'\n Installed version : ' + version +
'\n Fixed version : ' + fixed + '\n';
security_warning(port:port, proto:proto, extra:report);
}
else security_warning(port:port, proto:proto);
}
else not_vuln_installs = make_list(not_vuln_installs, version + " on port " + proto + "/" + port);
}
if (max_index(errors))
{
if (max_index(errors) == 1) errmsg = errors[0];
else errmsg = 'Errors were encountered verifying installs : \n ' + join(errors, sep:'\n ');
exit(1, errmsg);
}
else
{
installs = max_index(not_vuln_installs);
if (installs == 0)
{
if (is_vuln)
exit(0);
else
audit(AUDIT_NOT_INST, "Asterisk");
}
else if (installs == 1) audit(AUDIT_INST_VER_NOT_VULN, "Asterisk " + not_vuln_installs[0]);
else exit(0, "The Asterisk installs (" + join(not_vuln_installs, sep:", ") + ") are not affected.");
}
{"id": "ASTERISK_AST_2012_001.NASL", "bulletinFamily": "scanner", "title": "Asterisk SRTP Video Stream Negotiation Remote Crash (AST-2012-001)", "description": "According to the version in its SIP banner, the version of Asterisk\nrunning on the remote host is potentially affected by a vulnerability\nthat could allow a remote attacker to crash the server. The\nvulnerability can be triggered by attempting to negotiate a secure\nvideo stream when it has not been enabled and the res_srtp Asterisk\nmodule is loaded.", "published": "2012-03-22T00:00:00", "modified": "2021-02-02T00:00:00", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}, "href": "https://www.tenable.com/plugins/nessus/58431", "reporter": "This script is Copyright (C) 2012-2018 Tenable Network Security, Inc.", "references": ["http://downloads.asterisk.org/pub/security/AST-2012-001.html"], "cvelist": ["CVE-2012-0885"], "type": "nessus", "lastseen": "2021-02-01T01:23:57", "edition": 24, "viewCount": 3, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2012-0885"]}, {"type": "gentoo", "idList": ["GLSA-201202-06"]}, {"type": "openvas", "idList": ["OPENVAS:136141256231071181", "OPENVAS:71181", "OPENVAS:136141256231070751"]}, {"type": "nessus", "idList": ["GENTOO_GLSA-201202-06.NASL"]}], "modified": "2021-02-01T01:23:57", "rev": 2}, "score": {"value": 5.3, "vector": "NONE", "modified": "2021-02-01T01:23:57", "rev": 2}, "vulnersScore": 5.3}, "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(58431);\n script_version(\"1.12\");\n script_cvs_date(\"Date: 2018/06/27 18:42:26\");\n\n script_cve_id(\"CVE-2012-0885\");\n script_bugtraq_id(51581);\n\n script_name(english:\"Asterisk SRTP Video Stream Negotiation Remote Crash (AST-2012-001)\");\n script_summary(english:\"Checks version in SIP banner\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"A telephony application running on the remote host is affected by a\ndenial of service vulnerability.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"According to the version in its SIP banner, the version of Asterisk\nrunning on the remote host is potentially affected by a vulnerability\nthat could allow a remote attacker to crash the server. The\nvulnerability can be triggered by attempting to negotiate a secure\nvideo stream when it has not been enabled and the res_srtp Asterisk\nmodule is loaded.\"\n );\n script_set_attribute(attribute:\"see_also\", value:\"http://downloads.asterisk.org/pub/security/AST-2012-001.html\");\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"Upgrade to Asterisk 1.8.8.2 / 10.0.1 or apply the patches listed in\nthe Asterisk advisory.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/01/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/01/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/03/22\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:digium:asterisk\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Misc.\");\n\n script_copyright(english:\"This script is Copyright (C) 2012-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"asterisk_detection.nasl\");\n script_require_keys(\"asterisk/sip_detected\", \"Settings/ParanoidReport\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"asterisk/sip_detected\");\n\n# see if we were able to get version info from the Asterisk SIP services\nasterisk_kbs = get_kb_list(\"sip/asterisk/*/version\");\nif (isnull(asterisk_kbs)) exit(1, \"Could not obtain any version information from the Asterisk SIP instance(s).\");\n\n# Prevent potential false positives.\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\n\nis_vuln = FALSE;\nnot_vuln_installs = make_list();\nerrors = make_list();\n\nforeach kb_name (keys(asterisk_kbs))\n{\n vulnerable = 0;\n\n matches = eregmatch(pattern:\"/(udp|tcp)/([0-9]+)/version\", string:kb_name);\n if (isnull(matches))\n {\n errors = make_list(errors, \"Unexpected error parsing port number from kb name: \"+kb_name);\n continue;\n }\n\n proto = matches[1];\n port = matches[2];\n version = asterisk_kbs[kb_name];\n\n if (version == 'unknown')\n {\n errors = make_list(errors, \"Unable to obtain version of install on \" + proto + \"/\" + port);\n continue;\n }\n\n banner = get_kb_item(\"sip/asterisk/\" + proto + \"/\" + port + \"/source\");\n if (!banner)\n {\n # We have version but banner is missing; log error\n # and use in version-check though.\n errors = make_list(errors, \"KB item 'sip/asterisk/\" + proto + \"/\" + port + \"/source' is missing\");\n banner = 'unknown';\n }\n\n if (version =~ \"^1\\.8([^0-9]|$)\")\n {\n fixed = \"1.8.8.2\";\n vulnerable = ver_compare(ver:version, fix:fixed, app:\"asterisk\");\n }\n else if (version =~ \"^10([^0-9]|$)\")\n {\n fixed = \"10.0.1\";\n vulnerable = ver_compare(ver:version, fix:fixed, app:\"asterisk\");\n }\n\n if (vulnerable < 0)\n {\n is_vuln = TRUE;\n if (report_verbosity > 0)\n {\n report =\n '\\n Version source : ' + banner +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fixed + '\\n';\n security_warning(port:port, proto:proto, extra:report);\n }\n else security_warning(port:port, proto:proto);\n }\n else not_vuln_installs = make_list(not_vuln_installs, version + \" on port \" + proto + \"/\" + port);\n}\n\nif (max_index(errors))\n{\n if (max_index(errors) == 1) errmsg = errors[0];\n else errmsg = 'Errors were encountered verifying installs : \\n ' + join(errors, sep:'\\n ');\n\n exit(1, errmsg);\n}\nelse\n{\n installs = max_index(not_vuln_installs);\n if (installs == 0)\n {\n if (is_vuln)\n exit(0);\n else\n audit(AUDIT_NOT_INST, \"Asterisk\");\n }\n else if (installs == 1) audit(AUDIT_INST_VER_NOT_VULN, \"Asterisk \" + not_vuln_installs[0]);\n else exit(0, \"The Asterisk installs (\" + join(not_vuln_installs, sep:\", \") + \") are not affected.\");\n}\n", "naslFamily": "Misc.", "pluginID": "58431", "cpe": ["cpe:/a:digium:asterisk"], "scheme": null}
{"cve": [{"lastseen": "2021-02-02T05:59:46", "description": "chan_sip.c in Asterisk Open Source 1.8.x before 1.8.8.2 and 10.x before 10.0.1, when the res_srtp module is used and media support is improperly configured, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted SDP message with a crypto attribute and a (1) video or (2) text media type, as demonstrated by CSipSimple.", "edition": 4, "cvss3": {}, "published": "2012-01-25T15:55:00", "title": "CVE-2012-0885", "type": "cve", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-0885"], "modified": "2012-01-26T14:50:00", "cpe": ["cpe:/a:asterisk:open_source:1.8.3", "cpe:/a:asterisk:open_source:1.8.4.3", "cpe:/a:asterisk:open_source:1.8.3.2", "cpe:/a:asterisk:open_source:1.8.7.1", "cpe:/a:asterisk:open_source:1.8.7.0", "cpe:/a:asterisk:open_source:1.8.0", "cpe:/a:asterisk:open_source:1.8.8.0", "cpe:/a:asterisk:open_source:1.8.1.1", "cpe:/a:asterisk:open_source:1.8.8.1", "cpe:/a:asterisk:open_source:1.8.2.4", "cpe:/a:asterisk:open_source:1.8.2.1", "cpe:/a:asterisk:open_source:1.8.2.2", "cpe:/a:asterisk:open_source:1.8.2", "cpe:/a:asterisk:open_source:1.8.3.1", "cpe:/a:asterisk:open_source:1.8.3.3", "cpe:/a:asterisk:open_source:1.8.5", "cpe:/a:asterisk:open_source:1.8.1.2", "cpe:/a:asterisk:open_source:1.8.4.2", "cpe:/a:asterisk:open_source:1.8.1", "cpe:/a:asterisk:open_source:1.8.7.2", "cpe:/a:asterisk:open_source:1.8.6.0", "cpe:/a:asterisk:open_source:1.8.4.1", "cpe:/a:asterisk:open_source:1.8.2.3", "cpe:/a:asterisk:open_source:1.8.4", "cpe:/a:asterisk:open_source:10.0.0", "cpe:/a:asterisk:open_source:1.8.4.4", "cpe:/a:asterisk:open_source:1.8.5.0"], "id": "CVE-2012-0885", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0885", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:asterisk:open_source:1.8.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.8.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:10.0.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.3:rc1:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.4:rc3:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:10.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.7.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.6.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.4:rc1:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.5:rc1:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.8.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:10.0.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.3:rc3:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.8.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.3:rc2:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:10.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.4:rc2:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.8.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.8.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.6.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:10.0.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:10.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.7.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.8.3:*:*:*:*:*:*:*"]}], "gentoo": [{"lastseen": "2016-09-06T19:46:50", "bulletinFamily": "unix", "cvelist": ["CVE-2012-0885"], "edition": 1, "description": "### Background\n\nAsterisk is an open source telephony engine and toolkit.\n\n### Description\n\nA vulnerability has been found in Asterisk's handling of certain encrypted streams where the res_srtp module has been loaded but video support has not been enabled. \n\n### Impact\n\nA remote attacker could send a specially crafted SDP message to the Asterisk daemon, possibly resulting in a Denial of Service condition. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Asterisk users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=net-misc/asterisk-1.8.8.2\"", "modified": "2012-02-22T00:00:00", "published": "2012-02-22T00:00:00", "id": "GLSA-201202-06", "href": "https://security.gentoo.org/glsa/201202-06", "type": "gentoo", "title": "Asterisk: Denial of Service", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "openvas": [{"lastseen": "2017-07-24T12:50:47", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-0885"], "description": "The remote host is missing updates announced in\nadvisory GLSA 201202-06.", "modified": "2017-07-07T00:00:00", "published": "2012-03-12T00:00:00", "id": "OPENVAS:71181", "href": "http://plugins.openvas.org/nasl.php?oid=71181", "type": "openvas", "title": "Gentoo Security Advisory GLSA 201202-06 (asterisk)", "sourceData": "#\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A vulnerability in Asterisk could allow a remote attacker to cause\n a Denial of Service condition.\";\ntag_solution = \"All Asterisk users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=net-misc/asterisk-1.8.8.2'\n \n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20201202-06\nhttp://bugs.gentoo.org/show_bug.cgi?id=399507\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 201202-06.\";\n\n \n \nif(description)\n{\n script_id(71181);\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_cve_id(\"CVE-2012-0885\");\n script_version(\"$Revision: 6589 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 10:27:50 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-03-12 11:35:34 -0400 (Mon, 12 Mar 2012)\");\n script_name(\"Gentoo Security Advisory GLSA 201202-06 (asterisk)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\nres = \"\";\nreport = \"\";\nif((res = ispkgvuln(pkg:\"net-misc/asterisk\", unaffected: make_list(\"ge 1.8.8.2\"), vulnerable: make_list(\"lt 1.8.8.2\"))) != NULL ) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:39:12", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-0885"], "description": "The remote host is missing an update to the system\n as announced in the referenced advisory.", "modified": "2018-10-05T00:00:00", "published": "2012-02-12T00:00:00", "id": "OPENVAS:136141256231070751", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231070751", "type": "openvas", "title": "FreeBSD Ports: asterisk18", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: freebsd_asterisk182.nasl 11768 2018-10-05 14:07:38Z cfischer $\n#\n# Auto generated from VID dd698b76-42f7-11e1-a1b6-14dae9ebcf89\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.70751\");\n script_version(\"$Revision: 11768 $\");\n script_cve_id(\"CVE-2012-0885\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-05 16:07:38 +0200 (Fri, 05 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-02-12 07:27:20 -0500 (Sun, 12 Feb 2012)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_name(\"FreeBSD Ports: asterisk18\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsd\", \"ssh/login/freebsdrel\");\n\n script_tag(name:\"insight\", value:\"The following packages are affected:\n\n asterisk18\n\n asterisk10\");\n\n script_tag(name:\"solution\", value:\"Update your system with the appropriate patches or\n software upgrades.\");\n\n script_xref(name:\"URL\", value:\"http://downloads.asterisk.org/pub/security/AST-2012-001.html\");\n script_xref(name:\"URL\", value:\"http://www.vuxml.org/freebsd/dd698b76-42f7-11e1-a1b6-14dae9ebcf89.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update to the system\n as announced in the referenced advisory.\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-bsd.inc\");\n\nvuln = FALSE;\ntxt = \"\";\n\nbver = portver(pkg:\"asterisk18\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.8.8.2\")<0) {\n txt += 'Package asterisk18 version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = TRUE;\n}\nbver = portver(pkg:\"asterisk10\");\nif(!isnull(bver) && revcomp(a:bver, b:\"10.0.1\")<0) {\n txt += 'Package asterisk10 version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = TRUE;\n}\n\nif(vuln) {\n security_message(data:txt);\n} else if (__pkg_match) {\n exit(99);\n}", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:38:50", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-0885"], "description": "The remote host is missing updates announced in\nadvisory GLSA 201202-06.", "modified": "2018-10-12T00:00:00", "published": "2012-03-12T00:00:00", "id": "OPENVAS:136141256231071181", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231071181", "type": "openvas", "title": "Gentoo Security Advisory GLSA 201202-06 (asterisk)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: glsa_201202_06.nasl 11859 2018-10-12 08:53:01Z cfischer $\n#\n# Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.71181\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_cve_id(\"CVE-2012-0885\");\n script_version(\"$Revision: 11859 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-12 10:53:01 +0200 (Fri, 12 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-03-12 11:35:34 -0400 (Mon, 12 Mar 2012)\");\n script_name(\"Gentoo Security Advisory GLSA 201202-06 (asterisk)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name:\"insight\", value:\"A vulnerability in Asterisk could allow a remote attacker to cause\n a Denial of Service condition.\");\n script_tag(name:\"solution\", value:\"All Asterisk users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=net-misc/asterisk-1.8.8.2'\");\n\n script_xref(name:\"URL\", value:\"http://www.securityspace.com/smysecure/catid.html?in=GLSA%20201202-06\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=399507\");\n script_tag(name:\"summary\", value:\"The remote host is missing updates announced in\nadvisory GLSA 201202-06.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"pkg-lib-gentoo.inc\");\ninclude(\"revisions-lib.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = ispkgvuln(pkg:\"net-misc/asterisk\", unaffected: make_list(\"ge 1.8.8.2\"), vulnerable: make_list(\"lt 1.8.8.2\"))) != NULL ) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}], "nessus": [{"lastseen": "2021-01-07T10:53:27", "description": "The remote host is affected by the vulnerability described in GLSA-201202-06\n(Asterisk: Denial of Service)\n\n A vulnerability has been found in Asterisk's handling of certain\n encrypted streams where the res_srtp module has been loaded but video\n support has not been enabled.\n \nImpact :\n\n A remote attacker could send a specially crafted SDP message to the\n Asterisk daemon, possibly resulting in a Denial of Service condition.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 22, "published": "2012-02-23T00:00:00", "title": "GLSA-201202-06 : Asterisk: Denial of Service", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-0885"], "modified": "2012-02-23T00:00:00", "cpe": ["cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:asterisk"], "id": "GENTOO_GLSA-201202-06.NASL", "href": "https://www.tenable.com/plugins/nessus/58102", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201202-06.\n#\n# The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(58102);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2012-0885\");\n script_bugtraq_id(51581);\n script_xref(name:\"GLSA\", value:\"201202-06\");\n\n script_name(english:\"GLSA-201202-06 : Asterisk: Denial of Service\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201202-06\n(Asterisk: Denial of Service)\n\n A vulnerability has been found in Asterisk's handling of certain\n encrypted streams where the res_srtp module has been loaded but video\n support has not been enabled.\n \nImpact :\n\n A remote attacker could send a specially crafted SDP message to the\n Asterisk daemon, possibly resulting in a Denial of Service condition.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201202-06\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Asterisk users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=net-misc/asterisk-1.8.8.2'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:asterisk\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/02/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/02/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"net-misc/asterisk\", unaffected:make_list(\"ge 1.8.8.2\"), vulnerable:make_list(\"lt 1.8.8.2\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Asterisk\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}]}