5
CVSSv2

CVE-2014-8412

Published: 24/11/2014 Updated: 16/07/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

The (1) VoIP channel drivers, (2) DUNDi, and (3) Asterisk Manager Interface (AMI) in Asterisk Open Source 1.8.x prior to 1.8.32.1, 11.x prior to 11.14.1, 12.x prior to 12.7.1, and 13.x prior to 13.0.1 and Certified Asterisk 1.8.28 prior to 1.8.28-cert3 and 11.6 prior to 11.6-cert8 allows remote malicious users to bypass the ACL restrictions via a packet with a source IP that does not share the address family as the first ACL entry.

Vulnerable Product Search on Vulmon Subscribe to Product

digium certified asterisk 11.6

digium certified asterisk 1.8.28.0

digium certified asterisk 1.8.28

digium certified asterisk 11.6.0

digium asterisk

Vendor Advisories

Debian Bug report logs - #771463 CVE-2014-8418 CVE-2014-8412 CVE-2014-8414 CVE-2014-8417 Package: src:asterisk; Maintainer for src:asterisk is Debian VoIP Team <pkg-voip-maintainers@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Sat, 29 Nov 2014 21:36:01 UTC Severity: grave Tags: sec ...
Debian Bug report logs - #773230 asterisk: CVE-2014-9374 Package: src:asterisk; Maintainer for src:asterisk is Debian VoIP Team <pkg-voip-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 15 Dec 2014 20:30:02 UTC Severity: important Tags: fixed-upstream, security, ...