Asterisk Multiple Vulnerbilities
Last Update Date:
25 Nov 2014 10:47
Release Date:
25 Nov 2014
3515
Views
RISK: Medium Risk
TYPE: Clients - Im, Chat & Voip
Multiple vulnerabilities have been identified in Asterisk, which can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a vulnerable system.
- Some errors related to VoIP channel drivers, DUNDi, and AMI can lead to a bypass of certain ACL rules.
- A race condition error within the chan_pjsip channel driver when handling actions related to SIP sessions can be exploited to cause a crash.
- An error within the CONFBRIDGE dialplan function and DB dialplan function when used from external protocols can be exploited to gain otherwise restricted privileges and subsequently e.g. run arbitrary system commands.
Impact
- Denial of Service
- Remote Code Execution
- Security Restriction Bypass
System / Technologies affected
- Version 1.8.x, 11.x and 12.x
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- The vendor has issued a fix (1.8.32.1,11.14.1, 12.7.1, 13.0.1; 1.8.28-cert3,11.6-cert8).
Vulnerability Identifier
Source
Related Link
Share with