The (1) VoIP channel drivers, (2) DUNDi, and (3) Asterisk Manager Interface (AMI) in Asterisk Open Source 1.8.x prior to 1.8.32.1, 11.x prior to 11.14.1, 12.x prior to 12.7.1, and 13.x prior to 13.0.1 and Certified Asterisk 1.8.28 prior to 1.8.28-cert3 and 11.6 prior to 11.6-cert8 allows remote malicious users to bypass the ACL restrictions via a packet with a source IP that does not share the address family as the first ACL entry.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
digium certified asterisk 11.6 |
||
digium certified asterisk 1.8.28.0 |
||
digium certified asterisk 1.8.28 |
||
digium certified asterisk 11.6.0 |
||
digium asterisk |