Lucene search

K
cve[email protected]CVE-2014-8412
HistoryNov 24, 2014 - 3:59 p.m.

CVE-2014-8412

2014-11-2415:59:04
CWE-264
web.nvd.nist.gov
40
asterisk
voip
vulnerability
acl bypass
security advisory

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

6.4 Medium

AI Score

Confidence

Low

0.004 Low

EPSS

Percentile

74.1%

The (1) VoIP channel drivers, (2) DUNDi, and (3) Asterisk Manager Interface (AMI) in Asterisk Open Source 1.8.x before 1.8.32.1, 11.x before 11.14.1, 12.x before 12.7.1, and 13.x before 13.0.1 and Certified Asterisk 1.8.28 before 1.8.28-cert3 and 11.6 before 11.6-cert8 allows remote attackers to bypass the ACL restrictions via a packet with a source IP that does not share the address family as the first ACL entry.

Affected configurations

NVD
Node
digiumcertified_asteriskMatch1.8.28cert1lts
OR
digiumcertified_asteriskMatch1.8.28cert2lts
OR
digiumcertified_asteriskMatch1.8.28.0lts
OR
digiumcertified_asteriskMatch11.6cert1lts
OR
digiumcertified_asteriskMatch11.6cert2lts
OR
digiumcertified_asteriskMatch11.6cert3lts
OR
digiumcertified_asteriskMatch11.6cert4lts
OR
digiumcertified_asteriskMatch11.6cert5lts
OR
digiumcertified_asteriskMatch11.6cert6lts
OR
digiumcertified_asteriskMatch11.6cert7lts
OR
digiumcertified_asteriskMatch11.6.0lts
Node
digiumasteriskRange1.8.01.8.32.1
OR
digiumasteriskRange11.0.011.14.1
OR
digiumasteriskRange12.0.012.7.1
OR
digiumasteriskRange13.0.013.0.1

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

6.4 Medium

AI Score

Confidence

Low

0.004 Low

EPSS

Percentile

74.1%