Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-8412

Опубликовано: 24 нояб. 2014
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5

Описание

The (1) VoIP channel drivers, (2) DUNDi, and (3) Asterisk Manager Interface (AMI) in Asterisk Open Source 1.8.x before 1.8.32.1, 11.x before 11.14.1, 12.x before 12.7.1, and 13.x before 13.0.1 and Certified Asterisk 1.8.28 before 1.8.28-cert3 and 11.6 before 11.6-cert8 allows remote attackers to bypass the ACL restrictions via a packet with a source IP that does not share the address family as the first ACL entry.

РелизСтатусПримечание
artful

not-affected

1:13.1.0~dfsg-1ubuntu1
bionic

not-affected

1:13.1.0~dfsg-1ubuntu1
cosmic

not-affected

1:13.1.0~dfsg-1ubuntu1
devel

not-affected

1:13.1.0~dfsg-1ubuntu1
disco

not-affected

1:13.1.0~dfsg-1ubuntu1
esm-apps/bionic

not-affected

1:13.1.0~dfsg-1ubuntu1
esm-apps/xenial

not-affected

1:13.1.0~dfsg-1ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was needed]
lucid

ignored

end of life
precise

ignored

end of life

Показывать по

EPSS

Процентиль: 69%
0.00597
Низкий

5 Medium

CVSS2

Связанные уязвимости

nvd
около 11 лет назад

The (1) VoIP channel drivers, (2) DUNDi, and (3) Asterisk Manager Interface (AMI) in Asterisk Open Source 1.8.x before 1.8.32.1, 11.x before 11.14.1, 12.x before 12.7.1, and 13.x before 13.0.1 and Certified Asterisk 1.8.28 before 1.8.28-cert3 and 11.6 before 11.6-cert8 allows remote attackers to bypass the ACL restrictions via a packet with a source IP that does not share the address family as the first ACL entry.

debian
около 11 лет назад

The (1) VoIP channel drivers, (2) DUNDi, and (3) Asterisk Manager Inte ...

github
больше 3 лет назад

The (1) VoIP channel drivers, (2) DUNDi, and (3) Asterisk Manager Interface (AMI) in Asterisk Open Source 1.8.x before 1.8.32.1, 11.x before 11.14.1, 12.x before 12.7.1, and 13.x before 13.0.1 and Certified Asterisk 1.8.28 before 1.8.28-cert3 and 11.6 before 11.6-cert8 allows remote attackers to bypass the ACL restrictions via a packet with a source IP that does not share the address family as the first ACL entry.

EPSS

Процентиль: 69%
0.00597
Низкий

5 Medium

CVSS2