Asterisk 'res_http_websocket' Double-Free DoS (AST-2014-019)
2014-12-15T00:00:00
ID ASTERISK_AST_2014_019.NASL Type nessus Reporter This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2021-01-02T00:00:00
Description
According to the version in its SIP banner, the version of Asterisk
running on the remote host is potentially affected by a double-free
error related to the 'res_http_websocket' module and handling of
zero-length payloads that could allow denial of service attacks.
Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(80036);
script_version("1.10");
script_cvs_date("Date: 2019/11/25");
script_cve_id("CVE-2014-9374");
script_bugtraq_id(71607);
script_name(english:"Asterisk 'res_http_websocket' Double-Free DoS (AST-2014-019)");
script_summary(english:"Checks version in SIP banner.");
script_set_attribute(attribute:"synopsis", value:
"A telephony application running on the remote host is affected by a
denial of service vulnerability.");
script_set_attribute(attribute:"description", value:
"According to the version in its SIP banner, the version of Asterisk
running on the remote host is potentially affected by a double-free
error related to the 'res_http_websocket' module and handling of
zero-length payloads that could allow denial of service attacks.
Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.");
script_set_attribute(attribute:"see_also", value:"http://downloads.asterisk.org/pub/security/AST-2014-019.html");
script_set_attribute(attribute:"see_also", value:"https://issues.asterisk.org/jira/browse/ASTERISK-24472");
script_set_attribute(attribute:"solution", value:
"Upgrade to Asterisk 11.14.2 / 12.7.2 / 13.0.2 / 11.6-cert9 or apply
the appropriate patch listed in the Asterisk advisory.
Alternatively, as a workaround, disable the built-in HTTP server.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2014-9374");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2014/12/10");
script_set_attribute(attribute:"patch_publication_date", value:"2014/12/10");
script_set_attribute(attribute:"plugin_publication_date", value:"2014/12/15");
script_set_attribute(attribute:"potential_vulnerability", value:"true");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:digium:asterisk");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Misc.");
script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("asterisk_detection.nasl");
script_require_keys("asterisk/sip_detected", "Settings/ParanoidReport");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
get_kb_item_or_exit("asterisk/sip_detected");
asterisk_kbs = get_kb_list_or_exit("sip/asterisk/*/version");
if (report_paranoia < 2) audit(AUDIT_PARANOID);
is_vuln = FALSE;
not_vuln_installs = make_list();
errors = make_list();
foreach kb_name (keys(asterisk_kbs))
{
vulnerable = 0;
matches = eregmatch(pattern:"/(udp|tcp)/([0-9]+)/version", string:kb_name);
if (isnull(matches))
{
errors = make_list(errors, "Unexpected error parsing port number from '"+kb_name+"'.");
continue;
}
proto = matches[1];
port = matches[2];
version = asterisk_kbs[kb_name];
if (version == 'unknown')
{
errors = make_list(errors, "Unable to obtain version of install on " + proto + "/" + port + ".");
continue;
}
banner = get_kb_item("sip/asterisk/" + proto + "/" + port + "/source");
if (!banner)
{
# We have version but banner is missing;
# log error and use in version-check though.
errors = make_list(errors, "KB item 'sip/asterisk/" + proto + "/" + port + "/source' is missing.");
banner = 'unknown';
}
# Open Source 11.x < 11.14.2
if (version =~ "^11([^0-9]|$)" && "cert" >!< tolower(version))
{
fixed = "11.14.2";
vulnerable = ver_compare(ver:version, fix:fixed, app:"asterisk");
}
# Open Source 12.x < 12.7.2
else if (version =~ "^12([^0-9]|$)" && "cert" >!< tolower(version))
{
fixed = "12.7.2";
vulnerable = ver_compare(ver:version, fix:fixed, app:"asterisk");
}
# Open Source 13.x < 13.0.2
else if (version =~ "^13([^0-9]|$)" && "cert" >!< tolower(version))
{
fixed = "13.0.2";
vulnerable = ver_compare(ver:version, fix:fixed, app:"asterisk");
}
# Asterisk Certified 11.6-certx < 11.6-cert9
else if (version =~ "^11\.6([^0-9])" && "cert" >< tolower(version))
{
fixed = "11.6-cert9";
vulnerable = ver_compare(ver:version, fix:fixed, app:"asterisk");
}
if (vulnerable < 0)
{
is_vuln = TRUE;
if (report_verbosity > 0)
{
report =
'\n Version source : ' + banner +
'\n Installed version : ' + version +
'\n Fixed version : ' + fixed +
'\n';
security_warning(port:port, proto:proto, extra:report);
}
else security_warning(port:port, proto:proto);
}
else not_vuln_installs = make_list(not_vuln_installs, version + " on port " + proto + "/" + port);
}
if (max_index(errors))
{
if (max_index(errors) == 1) errmsg = errors[0];
else errmsg = 'Errors were encountered verifying installs : \n ' + join(errors, sep:'\n ');
exit(1, errmsg);
}
else
{
installs = max_index(not_vuln_installs);
if (installs == 0)
{
if (is_vuln) exit(0);
else audit(AUDIT_NOT_INST, "Asterisk");
}
else audit(AUDIT_INST_VER_NOT_VULN, "Asterisk", not_vuln_installs);
}
{"id": "ASTERISK_AST_2014_019.NASL", "bulletinFamily": "scanner", "title": "Asterisk 'res_http_websocket' Double-Free DoS (AST-2014-019)", "description": "According to the version in its SIP banner, the version of Asterisk\nrunning on the remote host is potentially affected by a double-free\nerror related to the 'res_http_websocket' module and handling of\nzero-length payloads that could allow denial of service attacks.\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.", "published": "2014-12-15T00:00:00", "modified": "2021-01-02T00:00:00", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "href": "https://www.tenable.com/plugins/nessus/80036", "reporter": "This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["https://issues.asterisk.org/jira/browse/ASTERISK-24472", "http://downloads.asterisk.org/pub/security/AST-2014-019.html"], "cvelist": ["CVE-2014-9374"], "type": "nessus", "lastseen": "2021-01-01T01:21:46", "edition": 26, "viewCount": 4, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2014-9374"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:31597", "SECURITYVULNS:VULN:14197"]}, {"type": "freebsd", "idList": ["94268DA0-8118-11E4-A180-001999F8D30B"]}, {"type": "nessus", "idList": ["MANDRIVA_MDVSA-2015-018.NASL", "GENTOO_GLSA-201412-51.NASL", "FREEBSD_PKG_94268DA0811811E4A180001999F8D30B.NASL"]}, {"type": "gentoo", "idList": ["GLSA-201412-51"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310121337"]}], "modified": "2021-01-01T01:21:46", "rev": 2}, "score": {"value": 6.0, "vector": "NONE", "modified": "2021-01-01T01:21:46", "rev": 2}, "vulnersScore": 6.0}, "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(80036);\n script_version(\"1.10\");\n script_cvs_date(\"Date: 2019/11/25\");\n\n script_cve_id(\"CVE-2014-9374\");\n script_bugtraq_id(71607);\n\n script_name(english:\"Asterisk 'res_http_websocket' Double-Free DoS (AST-2014-019)\");\n script_summary(english:\"Checks version in SIP banner.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A telephony application running on the remote host is affected by a\ndenial of service vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the version in its SIP banner, the version of Asterisk\nrunning on the remote host is potentially affected by a double-free\nerror related to the 'res_http_websocket' module and handling of\nzero-length payloads that could allow denial of service attacks.\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"http://downloads.asterisk.org/pub/security/AST-2014-019.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://issues.asterisk.org/jira/browse/ASTERISK-24472\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Asterisk 11.14.2 / 12.7.2 / 13.0.2 / 11.6-cert9 or apply\nthe appropriate patch listed in the Asterisk advisory.\n\nAlternatively, as a workaround, disable the built-in HTTP server.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2014-9374\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/12/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/12/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/12/15\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:digium:asterisk\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Misc.\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"asterisk_detection.nasl\");\n script_require_keys(\"asterisk/sip_detected\", \"Settings/ParanoidReport\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"asterisk/sip_detected\");\n\nasterisk_kbs = get_kb_list_or_exit(\"sip/asterisk/*/version\");\n\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\n\nis_vuln = FALSE;\nnot_vuln_installs = make_list();\nerrors = make_list();\n\nforeach kb_name (keys(asterisk_kbs))\n{\n vulnerable = 0;\n\n matches = eregmatch(pattern:\"/(udp|tcp)/([0-9]+)/version\", string:kb_name);\n if (isnull(matches))\n {\n errors = make_list(errors, \"Unexpected error parsing port number from '\"+kb_name+\"'.\");\n continue;\n }\n\n proto = matches[1];\n port = matches[2];\n version = asterisk_kbs[kb_name];\n\n if (version == 'unknown')\n {\n errors = make_list(errors, \"Unable to obtain version of install on \" + proto + \"/\" + port + \".\");\n continue;\n }\n\n banner = get_kb_item(\"sip/asterisk/\" + proto + \"/\" + port + \"/source\");\n if (!banner)\n {\n # We have version but banner is missing;\n # log error and use in version-check though.\n errors = make_list(errors, \"KB item 'sip/asterisk/\" + proto + \"/\" + port + \"/source' is missing.\");\n banner = 'unknown';\n }\n\n # Open Source 11.x < 11.14.2\n if (version =~ \"^11([^0-9]|$)\" && \"cert\" >!< tolower(version))\n {\n fixed = \"11.14.2\";\n vulnerable = ver_compare(ver:version, fix:fixed, app:\"asterisk\");\n }\n\n # Open Source 12.x < 12.7.2\n else if (version =~ \"^12([^0-9]|$)\" && \"cert\" >!< tolower(version))\n {\n fixed = \"12.7.2\";\n vulnerable = ver_compare(ver:version, fix:fixed, app:\"asterisk\");\n }\n\n # Open Source 13.x < 13.0.2\n else if (version =~ \"^13([^0-9]|$)\" && \"cert\" >!< tolower(version))\n {\n fixed = \"13.0.2\";\n vulnerable = ver_compare(ver:version, fix:fixed, app:\"asterisk\");\n }\n\n # Asterisk Certified 11.6-certx < 11.6-cert9\n else if (version =~ \"^11\\.6([^0-9])\" && \"cert\" >< tolower(version))\n {\n fixed = \"11.6-cert9\";\n vulnerable = ver_compare(ver:version, fix:fixed, app:\"asterisk\");\n }\n\n if (vulnerable < 0)\n {\n is_vuln = TRUE;\n if (report_verbosity > 0)\n {\n report =\n '\\n Version source : ' + banner +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fixed +\n '\\n';\n security_warning(port:port, proto:proto, extra:report);\n }\n else security_warning(port:port, proto:proto);\n }\n else not_vuln_installs = make_list(not_vuln_installs, version + \" on port \" + proto + \"/\" + port);\n}\n\nif (max_index(errors))\n{\n if (max_index(errors) == 1) errmsg = errors[0];\n else errmsg = 'Errors were encountered verifying installs : \\n ' + join(errors, sep:'\\n ');\n\n exit(1, errmsg);\n}\nelse\n{\n installs = max_index(not_vuln_installs);\n if (installs == 0)\n {\n if (is_vuln) exit(0);\n else audit(AUDIT_NOT_INST, \"Asterisk\");\n }\n else audit(AUDIT_INST_VER_NOT_VULN, \"Asterisk\", not_vuln_installs);\n}\n", "naslFamily": "Misc.", "pluginID": "80036", "cpe": ["cpe:/a:digium:asterisk"], "scheme": null}
{"cve": [{"lastseen": "2020-10-03T12:01:24", "description": "Double free vulnerability in the WebSocket Server (res_http_websocket module) in Asterisk Open Source 11.x before 11.14.2, 12.x before 12.7.2, and 13.x before 13.0.2 and Certified Asterisk 11.6 before 11.6-cert9 allows remote attackers to cause a denial of service (crash) by sending a zero length frame after a non-zero length frame.\n<a href=\"http://cwe.mitre.org/data/definitions/415.html\">CWE-415: Double Free</a>", "edition": 3, "cvss3": {}, "published": "2014-12-12T15:59:00", "title": "CVE-2014-9374", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-9374"], "modified": "2018-10-09T19:55:00", "cpe": ["cpe:/a:digium:asterisk:11.14.0", "cpe:/a:digium:asterisk:12.3.0", "cpe:/a:digium:asterisk:11.3.0", "cpe:/a:digium:asterisk:13.0.1", "cpe:/a:digium:asterisk:13.0.0", "cpe:/a:digium:asterisk:11.12.0", "cpe:/a:digium:asterisk:11.9.0", "cpe:/a:digium:asterisk:12.5.0", "cpe:/a:digium:asterisk:11.7.0", "cpe:/a:digium:asterisk:11.10.0", "cpe:/a:digium:certified_asterisk:11.6.0", "cpe:/a:digium:asterisk:11.4.0", "cpe:/a:digium:asterisk:11.2.0", "cpe:/a:digium:asterisk:12.0.0", "cpe:/a:digium:asterisk:11.11.0", "cpe:/a:digium:asterisk:12.6.0", "cpe:/a:digium:asterisk:11.8.0", "cpe:/a:digium:asterisk:11.6.0", "cpe:/a:digium:asterisk:12.1.0", "cpe:/a:digium:asterisk:11.5.0", "cpe:/a:digium:asterisk:11.0.0", "cpe:/a:digium:asterisk:11.1.0", "cpe:/a:digium:asterisk:12.7.0", "cpe:/a:digium:asterisk:12.7.1", "cpe:/a:digium:asterisk:12.4.0", "cpe:/a:digium:asterisk:12.2.0", "cpe:/a:digium:asterisk:11.13.0", "cpe:/a:digium:certified_asterisk:11.6"], "id": "CVE-2014-9374", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9374", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:digium:asterisk:11.9.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:lts:*:*:*", "cpe:2.3:a:digium:asterisk:11.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.9.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.11.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.8.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.14.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6.0:*:*:*:lts:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6:cert4:*:*:lts:*:*:*", "cpe:2.3:a:digium:asterisk:11.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.4.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:13.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.1.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.7.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.2.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.3.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.8.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.4.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.10.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.3.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.5.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.14.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:13.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.5.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.7.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.3.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.3.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.6.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.12.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6:cert6:*:*:lts:*:*:*", "cpe:2.3:a:digium:asterisk:11.4.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.4.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.4.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.7.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6:cert7:*:*:lts:*:*:*", "cpe:2.3:a:digium:asterisk:11.7.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.13.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.5.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:lts:*:*:*", "cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.9.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.8.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6:cert8:*:*:lts:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:lts:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6:cert5:*:*:lts:*:*:*"]}], "securityvulns": [{"lastseen": "2018-08-31T11:10:56", "bulletinFamily": "software", "cvelist": ["CVE-2014-9374"], "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n\r\n Mandriva Linux Security Advisory MDVSA-2015:018\r\n http://www.mandriva.com/en/support/security/\r\n _______________________________________________________________________\r\n\r\n Package : asterisk\r\n Date : January 8, 2015\r\n Affected: Business Server 1.0\r\n _______________________________________________________________________\r\n\r\n Problem Description:\r\n\r\n Updated asterisk packages fix security vulnerability:\r\n \r\n Double free vulnerability in the WebSocket Server (res_http_websocket\r\n module) in Asterisk Open Source 11.x before 11.14.2 allows remote\r\n attackers to cause a denial of service (crash) by sending a zero\r\n length frame after a non-zero length frame (CVE-2014-9374).\r\n _______________________________________________________________________\r\n\r\n References:\r\n\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9374\r\n http://advisories.mageia.org/MGASA-2015-0010.html\r\n _______________________________________________________________________\r\n\r\n Updated Packages:\r\n\r\n Mandriva Business Server 1/X86_64:\r\n 81aafef92e7c97b6bbd8434c474e242b mbs1/x86_64/asterisk-11.14.2-1.mbs1.x86_64.rpm\r\n dda93e3159f6dc14b15a16e03e785c6d mbs1/x86_64/asterisk-addons-11.14.2-1.mbs1.x86_64.rpm\r\n dff8d07b3864f66e20dcff37c5d77cb4 mbs1/x86_64/asterisk-devel-11.14.2-1.mbs1.x86_64.rpm\r\n 6b064592c97b1d53f036595770302e20 mbs1/x86_64/asterisk-firmware-11.14.2-1.mbs1.x86_64.rpm\r\n 732278096456a386a96839b906655421 mbs1/x86_64/asterisk-gui-11.14.2-1.mbs1.x86_64.rpm\r\n d478bede711aa7843d81286d88212ea8 mbs1/x86_64/asterisk-plugins-alsa-11.14.2-1.mbs1.x86_64.rpm\r\n 5ed14ec42661c13491e739efb326cbe6 mbs1/x86_64/asterisk-plugins-calendar-11.14.2-1.mbs1.x86_64.rpm\r\n f3b0c352a4af586271b0500c98873c5a mbs1/x86_64/asterisk-plugins-cel-11.14.2-1.mbs1.x86_64.rpm\r\n 4670b9fd07b7cdf1dc4c7a3d465468a5 mbs1/x86_64/asterisk-plugins-corosync-11.14.2-1.mbs1.x86_64.rpm\r\n fee7d4351c7042614bc458f65afe9c56 mbs1/x86_64/asterisk-plugins-curl-11.14.2-1.mbs1.x86_64.rpm\r\n 558ab4e6576aa72250a442d60f91e71b mbs1/x86_64/asterisk-plugins-dahdi-11.14.2-1.mbs1.x86_64.rpm\r\n 29bc6ef16736fe0c4ff5f811562e5fb0 mbs1/x86_64/asterisk-plugins-fax-11.14.2-1.mbs1.x86_64.rpm\r\n c9df28a3a9d6042d1eaf251ebd6a74b1 mbs1/x86_64/asterisk-plugins-festival-11.14.2-1.mbs1.x86_64.rpm\r\n 18e82c5c23ead3e458fd00a77d9e4fa6 mbs1/x86_64/asterisk-plugins-ices-11.14.2-1.mbs1.x86_64.rpm\r\n dbf6689b1a83eed16468a88101d9f7c3 mbs1/x86_64/asterisk-plugins-jabber-11.14.2-1.mbs1.x86_64.rpm\r\n 55d39478ea6cb898f079f3dacc5bf7aa mbs1/x86_64/asterisk-plugins-jack-11.14.2-1.mbs1.x86_64.rpm\r\n 88a823d6c553d4aa8b0143349dfbdd50 mbs1/x86_64/asterisk-plugins-ldap-11.14.2-1.mbs1.x86_64.rpm\r\n 94e154a1f9c2eabd7beaa8cb09b2a31f mbs1/x86_64/asterisk-plugins-lua-11.14.2-1.mbs1.x86_64.rpm\r\n c4200d468a8d14c09b3961e91ac69c03 mbs1/x86_64/asterisk-plugins-minivm-11.14.2-1.mbs1.x86_64.rpm\r\n c56cdc9b2f81c0a418e911175b0d6754 mbs1/x86_64/asterisk-plugins-mobile-11.14.2-1.mbs1.x86_64.rpm\r\n d11742a4c240bb6031b1384740dfce29 mbs1/x86_64/asterisk-plugins-mp3-11.14.2-1.mbs1.x86_64.rpm\r\n b8a5996440f595d2eb20f9062b4be128 mbs1/x86_64/asterisk-plugins-mysql-11.14.2-1.mbs1.x86_64.rpm\r\n 1530f81861f2300b4db8abcff11040ec mbs1/x86_64/asterisk-plugins-ooh323-11.14.2-1.mbs1.x86_64.rpm\r\n 70b8f9fd11e8fcffdc9939036fbe9f36 mbs1/x86_64/asterisk-plugins-osp-11.14.2-1.mbs1.x86_64.rpm\r\n 961206588c23b0e5ffd8d3d1cbc8dfaa mbs1/x86_64/asterisk-plugins-oss-11.14.2-1.mbs1.x86_64.rpm\r\n a354dfdaf710253c01395f80abcb9bae mbs1/x86_64/asterisk-plugins-pgsql-11.14.2-1.mbs1.x86_64.rpm\r\n da369952774b990bb4feb68b78e1caf7 mbs1/x86_64/asterisk-plugins-pktccops-11.14.2-1.mbs1.x86_64.rpm\r\n 2993f20fc663e2fc7f84e5cf139a11c6 mbs1/x86_64/asterisk-plugins-portaudio-11.14.2-1.mbs1.x86_64.rpm\r\n fc5e45e837d95e24a087be98cf403fd7 mbs1/x86_64/asterisk-plugins-radius-11.14.2-1.mbs1.x86_64.rpm\r\n e5bde4633013f20e24be232d203ec302 mbs1/x86_64/asterisk-plugins-saycountpl-11.14.2-1.mbs1.x86_64.rpm\r\n a99c2468bf57d1c011d78f038997d574 mbs1/x86_64/asterisk-plugins-skinny-11.14.2-1.mbs1.x86_64.rpm\r\n 7e5d10954234ae302f5e00a14d38180f mbs1/x86_64/asterisk-plugins-snmp-11.14.2-1.mbs1.x86_64.rpm\r\n 08553a02b47ac96b0033d63278517bbe mbs1/x86_64/asterisk-plugins-speex-11.14.2-1.mbs1.x86_64.rpm\r\n 4a3a99a59828c470908e5f96167daf16 mbs1/x86_64/asterisk-plugins-sqlite-11.14.2-1.mbs1.x86_64.rpm\r\n 00b9dd9a86365a1129b6ee9f0d76272a mbs1/x86_64/asterisk-plugins-tds-11.14.2-1.mbs1.x86_64.rpm\r\n 711bced0894ca0838929ed9a782de6db mbs1/x86_64/asterisk-plugins-unistim-11.14.2-1.mbs1.x86_64.rpm\r\n 7aeb39f8bc0448f7a21dd83c38dce74e mbs1/x86_64/asterisk-plugins-voicemail-11.14.2-1.mbs1.x86_64.rpm\r\n b33d31b06c7955bfa97c4ef70435e070 mbs1/x86_64/asterisk-plugins-voicemail-imap-11.14.2-1.mbs1.x86_64.rpm\r\n 0d60804315558069de6eb9eef824a35f mbs1/x86_64/asterisk-plugins-voicemail-plain-11.14.2-1.mbs1.x86_64.rpm\r\n b85a09d05e198729792a03b9b18140c9 mbs1/x86_64/lib64asteriskssl1-11.14.2-1.mbs1.x86_64.rpm \r\n 0112ed7785f2689191f863330c460239 mbs1/SRPMS/asterisk-11.14.2-1.mbs1.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/en/support/security/advisories/\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.12 (GNU/Linux)\r\n\r\niD8DBQFUrqQ0mqjQ0CJFipgRArn9AJ0ZEd6gr7OmVBxLfakNaoph8G32bgCfeH1x\r\nPtZL9E+mqBhz+mHc5wIeYO8=\r\n=pA10\r\n-----END PGP SIGNATURE-----\r\n\r\n", "edition": 1, "modified": "2015-01-13T00:00:00", "published": "2015-01-13T00:00:00", "id": "SECURITYVULNS:DOC:31597", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:31597", "title": "[ MDVSA-2015:018 ] asterisk", "type": "securityvulns", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:09:58", "bulletinFamily": "software", "cvelist": ["CVE-2014-9374"], "description": "Crash on empty WebSocket frame. File descriptor leak on incompatible codecs.", "edition": 1, "modified": "2015-02-02T00:00:00", "published": "2015-02-02T00:00:00", "id": "SECURITYVULNS:VULN:14197", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:14197", "title": "Asterisk DoS", "type": "securityvulns", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "nessus": [{"lastseen": "2021-01-07T11:54:51", "description": "Updated asterisk packages fix security vulnerability :\n\nDouble free vulnerability in the WebSocket Server (res_http_websocket\nmodule) in Asterisk Open Source 11.x before 11.14.2 allows remote\nattackers to cause a denial of service (crash) by sending a zero\nlength frame after a non-zero length frame (CVE-2014-9374).", "edition": 25, "published": "2015-01-09T00:00:00", "title": "Mandriva Linux Security Advisory : asterisk (MDVSA-2015:018)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-9374"], "modified": "2015-01-09T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:asterisk-addons", "p-cpe:/a:mandriva:linux:asterisk-devel", "p-cpe:/a:mandriva:linux:asterisk-plugins-ldap", "cpe:/o:mandriva:business_server:1", "p-cpe:/a:mandriva:linux:asterisk-plugins-sqlite", "p-cpe:/a:mandriva:linux:asterisk-plugins-lua", "p-cpe:/a:mandriva:linux:asterisk-plugins-speex", "p-cpe:/a:mandriva:linux:asterisk-plugins-cel", "p-cpe:/a:mandriva:linux:asterisk-plugins-corosync", "p-cpe:/a:mandriva:linux:asterisk-gui", "p-cpe:/a:mandriva:linux:asterisk-plugins-mp3", "p-cpe:/a:mandriva:linux:asterisk-plugins-calendar", "p-cpe:/a:mandriva:linux:asterisk-plugins-minivm", "p-cpe:/a:mandriva:linux:asterisk-plugins-pktccops", "p-cpe:/a:mandriva:linux:asterisk-plugins-snmp", "p-cpe:/a:mandriva:linux:asterisk-plugins-saycountpl", "p-cpe:/a:mandriva:linux:asterisk-plugins-voicemail", "p-cpe:/a:mandriva:linux:asterisk-plugins-voicemail-plain", "p-cpe:/a:mandriva:linux:asterisk-plugins-radius", "p-cpe:/a:mandriva:linux:asterisk-plugins-pgsql", "p-cpe:/a:mandriva:linux:asterisk-plugins-mysql", "p-cpe:/a:mandriva:linux:asterisk-plugins-dahdi", "p-cpe:/a:mandriva:linux:asterisk-plugins-jabber", "p-cpe:/a:mandriva:linux:asterisk-plugins-unistim", "p-cpe:/a:mandriva:linux:asterisk-plugins-portaudio", "p-cpe:/a:mandriva:linux:asterisk-firmware", "p-cpe:/a:mandriva:linux:asterisk-plugins-mobile", "p-cpe:/a:mandriva:linux:asterisk-plugins-skinny", "p-cpe:/a:mandriva:linux:asterisk-plugins-tds", "p-cpe:/a:mandriva:linux:asterisk-plugins-curl", "p-cpe:/a:mandriva:linux:asterisk-plugins-ooh323", "p-cpe:/a:mandriva:linux:asterisk-plugins-fax", "p-cpe:/a:mandriva:linux:asterisk-plugins-voicemail-imap", "p-cpe:/a:mandriva:linux:asterisk", "p-cpe:/a:mandriva:linux:asterisk-plugins-festival", "p-cpe:/a:mandriva:linux:asterisk-plugins-alsa", "p-cpe:/a:mandriva:linux:asterisk-plugins-jack", "p-cpe:/a:mandriva:linux:asterisk-plugins-oss", "p-cpe:/a:mandriva:linux:lib64asteriskssl1", "p-cpe:/a:mandriva:linux:asterisk-plugins-ices", "p-cpe:/a:mandriva:linux:asterisk-plugins-osp"], "id": "MANDRIVA_MDVSA-2015-018.NASL", "href": "https://www.tenable.com/plugins/nessus/80437", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2015:018. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(80437);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2014-9374\");\n script_bugtraq_id(71607);\n script_xref(name:\"MDVSA\", value:\"2015:018\");\n\n script_name(english:\"Mandriva Linux Security Advisory : asterisk (MDVSA-2015:018)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated asterisk packages fix security vulnerability :\n\nDouble free vulnerability in the WebSocket Server (res_http_websocket\nmodule) in Asterisk Open Source 11.x before 11.14.2 allows remote\nattackers to cause a denial of service (crash) by sending a zero\nlength frame after a non-zero length frame (CVE-2014-9374).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://advisories.mageia.org/MGASA-2015-0010.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-addons\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-firmware\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-gui\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-alsa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-calendar\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-cel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-corosync\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-curl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-dahdi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-fax\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-festival\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-ices\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-jabber\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-jack\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-ldap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-lua\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-minivm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-mobile\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-mp3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-ooh323\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-osp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-oss\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-pgsql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-pktccops\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-portaudio\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-radius\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-saycountpl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-skinny\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-snmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-speex\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-sqlite\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-tds\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-unistim\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-voicemail\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-voicemail-imap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:asterisk-plugins-voicemail-plain\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64asteriskssl1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:business_server:1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/01/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/01/09\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-addons-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-devel-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-firmware-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-gui-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-alsa-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-calendar-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-cel-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-corosync-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-curl-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-dahdi-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-fax-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-festival-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-ices-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-jabber-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-jack-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-ldap-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-lua-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-minivm-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-mobile-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-mp3-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-mysql-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-ooh323-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-osp-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-oss-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-pgsql-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-pktccops-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-portaudio-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-radius-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-saycountpl-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-skinny-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-snmp-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-speex-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-sqlite-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-tds-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-unistim-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-voicemail-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-voicemail-imap-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"asterisk-plugins-voicemail-plain-11.14.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"lib64asteriskssl1-11.14.2-1.mbs1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-07T10:47:36", "description": "The Asterisk project reports :\n\nWhen handling a WebSocket frame the res_http_websocket module\ndynamically changes the size of the memory used to allow the provided\npayload to fit. If a payload length of zero was received the code\nwould incorrectly attempt to resize to zero. This operation would\nsucceed and end up freeing the memory but be treated as a failure.\nWhen the session was subsequently torn down this memory would get\nfreed yet again causing a crash.\n\nUsers of the WebSocket functionality also did not take into account\nthat provided text frames are not guaranteed to be NULL terminated.\nThis has been fixed in chan_sip and chan_pjsip in the applicable\nversions.", "edition": 21, "published": "2014-12-15T00:00:00", "title": "FreeBSD : asterisk -- Remote Crash Vulnerability in WebSocket Server (94268da0-8118-11e4-a180-001999f8d30b)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-9374"], "modified": "2014-12-15T00:00:00", "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:asterisk11"], "id": "FREEBSD_PKG_94268DA0811811E4A180001999F8D30B.NASL", "href": "https://www.tenable.com/plugins/nessus/79956", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(79956);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2014-9374\");\n\n script_name(english:\"FreeBSD : asterisk -- Remote Crash Vulnerability in WebSocket Server (94268da0-8118-11e4-a180-001999f8d30b)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The Asterisk project reports :\n\nWhen handling a WebSocket frame the res_http_websocket module\ndynamically changes the size of the memory used to allow the provided\npayload to fit. If a payload length of zero was received the code\nwould incorrectly attempt to resize to zero. This operation would\nsucceed and end up freeing the memory but be treated as a failure.\nWhen the session was subsequently torn down this memory would get\nfreed yet again causing a crash.\n\nUsers of the WebSocket functionality also did not take into account\nthat provided text frames are not guaranteed to be NULL terminated.\nThis has been fixed in chan_sip and chan_pjsip in the applicable\nversions.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://downloads.asterisk.org/pub/security/AST-2014-019.html\"\n );\n # https://vuxml.freebsd.org/freebsd/94268da0-8118-11e4-a180-001999f8d30b.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b57cf33c\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:asterisk11\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/10/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/12/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/12/15\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"asterisk11<11.14.2\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-07T10:56:47", "description": "The remote host is affected by the vulnerability described in GLSA-201412-51\n(Asterisk: Multiple vulnerabilities)\n\n Multiple unspecified vulnerabilities have been discovered in Asterisk.\n Please review the CVE identifiers referenced below for details.\n \nImpact :\n\n Unauthenticated remote attackers can cause Denial of Service or bypass\n intended ACL restrictions. Authenticated remote attackers can gain\n escalated privileges.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 20, "published": "2014-12-29T00:00:00", "title": "GLSA-201412-51 : Asterisk: Multiple vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-8418", "CVE-2014-9374", "CVE-2014-8414", "CVE-2014-8417", "CVE-2014-8412"], "modified": "2014-12-29T00:00:00", "cpe": ["cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:asterisk"], "id": "GENTOO_GLSA-201412-51.NASL", "href": "https://www.tenable.com/plugins/nessus/80272", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201412-51.\n#\n# The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(80272);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2014-8412\", \"CVE-2014-8414\", \"CVE-2014-8417\", \"CVE-2014-8418\", \"CVE-2014-9374\");\n script_bugtraq_id(71218, 71222, 71227, 71228, 71607);\n script_xref(name:\"GLSA\", value:\"201412-51\");\n\n script_name(english:\"GLSA-201412-51 : Asterisk: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201412-51\n(Asterisk: Multiple vulnerabilities)\n\n Multiple unspecified vulnerabilities have been discovered in Asterisk.\n Please review the CVE identifiers referenced below for details.\n \nImpact :\n\n Unauthenticated remote attackers can cause Denial of Service or bypass\n intended ACL restrictions. Authenticated remote attackers can gain\n escalated privileges.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201412-51\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All asterisk users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=net-misc/asterisk-11.14.2'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:asterisk\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/12/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/12/29\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"net-misc/asterisk\", unaffected:make_list(\"ge 11.14.2\"), vulnerable:make_list(\"lt 11.14.2\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Asterisk\");\n}\n", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}], "freebsd": [{"lastseen": "2019-05-29T18:33:22", "bulletinFamily": "unix", "cvelist": ["CVE-2014-9374"], "description": "\nThe Asterisk project reports:\n\nWhen handling a WebSocket frame the res_http_websocket\n\t module dynamically changes the size of the memory used\n\t to allow the provided payload to fit. If a payload length\n\t of zero was received the code would incorrectly attempt\n\t to resize to zero. This operation would succeed and end\n\t up freeing the memory but be treated as a failure. When\n\t the session was subsequently torn down this memory would\n\t get freed yet again causing a crash.\nUsers of the WebSocket functionality also did not take\n\t into account that provided text frames are not guaranteed\n\t to be NULL terminated. This has been fixed in chan_sip\n\t and chan_pjsip in the applicable versions.\n\n", "edition": 4, "modified": "2015-01-29T00:00:00", "published": "2014-10-30T00:00:00", "id": "94268DA0-8118-11E4-A180-001999F8D30B", "href": "https://vuxml.freebsd.org/freebsd/94268da0-8118-11e4-a180-001999f8d30b.html", "title": "asterisk -- Remote Crash Vulnerability in WebSocket Server", "type": "freebsd", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "gentoo": [{"lastseen": "2016-09-06T19:47:01", "bulletinFamily": "unix", "cvelist": ["CVE-2014-8418", "CVE-2014-9374", "CVE-2014-8414", "CVE-2014-8417", "CVE-2014-8412"], "description": "### Background\n\nAsterisk is an open source telephony engine and toolkit.\n\n### Description\n\nMultiple unspecified vulnerabilities have been discovered in Asterisk. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nUnauthenticated remote attackers can cause Denial of Service or bypass intended ACL restrictions. Authenticated remote attackers can gain escalated privileges. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll asterisk users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=net-misc/asterisk-11.14.2\"", "edition": 1, "modified": "2014-12-28T00:00:00", "published": "2014-12-28T00:00:00", "id": "GLSA-201412-51", "href": "https://security.gentoo.org/glsa/201412-51", "type": "gentoo", "title": "Asterisk: Multiple vulnerabilities", "cvss": {"score": 9.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "openvas": [{"lastseen": "2019-05-29T18:35:59", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-8418", "CVE-2014-9374", "CVE-2014-8414", "CVE-2014-8417", "CVE-2014-8412"], "description": "Gentoo Linux Local Security Checks GLSA 201412-51", "modified": "2018-10-26T00:00:00", "published": "2015-09-29T00:00:00", "id": "OPENVAS:1361412562310121337", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310121337", "type": "openvas", "title": "Gentoo Security Advisory GLSA 201412-51", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: glsa-201412-51.nasl 12128 2018-10-26 13:35:25Z cfischer $\n#\n# Gentoo Linux security check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.121337\");\n script_version(\"$Revision: 12128 $\");\n script_tag(name:\"creation_date\", value:\"2015-09-29 11:28:26 +0300 (Tue, 29 Sep 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-26 15:35:25 +0200 (Fri, 26 Oct 2018) $\");\n script_name(\"Gentoo Security Advisory GLSA 201412-51\");\n script_tag(name:\"insight\", value:\"Multiple unspecified vulnerabilities have been discovered in Asterisk. Please review the CVE identifiers referenced below for details.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://security.gentoo.org/glsa/201412-51\");\n script_cve_id(\"CVE-2014-8412\", \"CVE-2014-8414\", \"CVE-2014-8417\", \"CVE-2014-8418\", \"CVE-2014-9374\");\n script_tag(name:\"cvss_base\", value:\"9.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"Gentoo Linux Local Security Checks GLSA 201412-51\");\n script_copyright(\"Eero Volotinen\");\n script_family(\"Gentoo Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\n\nif((res=ispkgvuln(pkg:\"net-misc/asterisk\", unaffected: make_list(\"ge 11.14.2\"), vulnerable: make_list(\"lt 11.14.2\"))) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}]}