Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-1224

Опубликовано: 01 апр. 2010
Источник: ubuntu
Приоритет: medium
CVSS2: 4.3

Описание

main/acl.c in Asterisk Open Source 1.6.0.x before 1.6.0.25, 1.6.1.x before 1.6.1.17, and 1.6.2.x before 1.6.2.5 does not properly enforce remote host access controls when CIDR notation "/0" is used in permit= and deny= configuration rules, which causes an improper arithmetic shift and might allow remote attackers to bypass ACL rules and access services from unauthorized hosts.

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

1:1.8.3.3-1ubuntu1
hardy

not-affected

intrepid

ignored

end of life, was needs-triage
jaunty

ignored

end of life
karmic

ignored

end of life
lucid

not-affected

1:1.6.2.5-0ubuntu1.3
maverick

not-affected

1:1.6.2.7-1ubuntu1.1
natty

not-affected

1:1.6.2.9-2ubuntu2
upstream

released

1.6.0.25, 1.6.1.17, 1.6.2.5

Показывать по

4.3 Medium

CVSS2

Связанные уязвимости

nvd
больше 15 лет назад

main/acl.c in Asterisk Open Source 1.6.0.x before 1.6.0.25, 1.6.1.x before 1.6.1.17, and 1.6.2.x before 1.6.2.5 does not properly enforce remote host access controls when CIDR notation "/0" is used in permit= and deny= configuration rules, which causes an improper arithmetic shift and might allow remote attackers to bypass ACL rules and access services from unauthorized hosts.

debian
больше 15 лет назад

main/acl.c in Asterisk Open Source 1.6.0.x before 1.6.0.25, 1.6.1.x be ...

github
больше 3 лет назад

main/acl.c in Asterisk Open Source 1.6.0.x before 1.6.0.25, 1.6.1.x before 1.6.1.17, and 1.6.2.x before 1.6.2.5 does not properly enforce remote host access controls when CIDR notation "/0" is used in permit= and deny= configuration rules, which causes an improper arithmetic shift and might allow remote attackers to bypass ACL rules and access services from unauthorized hosts.

4.3 Medium

CVSS2