Skip to main content

Asterisk Multiple Vulnerbilities

Last Update Date: 25 Nov 2014 10:47 Release Date: 25 Nov 2014 2980 Views

RISK: Medium Risk

TYPE: Clients - Im, Chat & Voip

TYPE: Im, Chat & Voip

Multiple vulnerabilities have been identified in Asterisk, which can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a vulnerable system.

  1. Some errors related to VoIP channel drivers, DUNDi, and AMI can lead to a bypass of certain ACL rules.
  2. A race condition error within the chan_pjsip channel driver when handling actions related to SIP sessions can be exploited to cause a crash.
  3. An error within the CONFBRIDGE dialplan function and DB dialplan function when used from external protocols can be exploited to gain otherwise restricted privileges and subsequently e.g. run arbitrary system commands.

Impact

  • Denial of Service
  • Remote Code Execution
  • Security Restriction Bypass

System / Technologies affected

  • Version 1.8.x, 11.x and 12.x

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • The vendor has issued a fix (1.8.32.1,11.14.1, 12.7.1, 13.0.1; 1.8.28-cert3,11.6-cert8).

Vulnerability Identifier


Source


Related Link