Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-8413

Опубликовано: 24 нояб. 2014
Источник: debian

Описание

The res_pjsip_acl module in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1 does not properly create and load ACLs defined in pjsip.conf at startup, which allows remote attackers to bypass intended PJSIP ACL rules.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
asteriskfixed1:13.1.0~dfsg-1package
asterisknot-affectedjessiepackage
asterisknot-affectedwheezypackage
asterisknot-affectedsqueezepackage

Примечания

  • https://issues.asterisk.org/jira/browse/ASTERISK-24531

  • http://downloads.digium.com/pub/security/AST-2014-013.html

Связанные уязвимости

ubuntu
около 11 лет назад

The res_pjsip_acl module in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1 does not properly create and load ACLs defined in pjsip.conf at startup, which allows remote attackers to bypass intended PJSIP ACL rules.

nvd
около 11 лет назад

The res_pjsip_acl module in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1 does not properly create and load ACLs defined in pjsip.conf at startup, which allows remote attackers to bypass intended PJSIP ACL rules.

github
больше 3 лет назад

The res_pjsip_acl module in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1 does not properly create and load ACLs defined in pjsip.conf at startup, which allows remote attackers to bypass intended PJSIP ACL rules.