channels/chan_iax2.c in Asterisk Open Source 1.8.x before 1.8.15.1 and 10.x before 10.7.1, Certified Asterisk 1.8.11 before 1.8.11-cert7, Asterisk Digiumphones 10.x.x-digiumphones before 10.7.1-digiumphones, and Asterisk Business Edition C.3.x before C.3.7.6 does not enforce ACL rules during certain uses of peer credentials, which allows remote authenticated users to bypass intended outbound-call restrictions by leveraging the availability of these credentials.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 01:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://downloads.asterisk.org/pub/security/AST-2012-013.html - Vendor Advisory | |
References | () http://secunia.com/advisories/50687 - | |
References | () http://secunia.com/advisories/50756 - | |
References | () http://www.debian.org/security/2012/dsa-2550 - | |
References | () http://www.securityfocus.com/bid/55335 - | |
References | () http://www.securitytracker.com/id?1027461 - |
Information
Published : 2012-08-31 14:55
Updated : 2024-11-21 01:43
NVD link : CVE-2012-4737
Mitre link : CVE-2012-4737
CVE.ORG link : CVE-2012-4737
JSON object : View
Products Affected
digium
- asterisk
- certified_asterisk
CWE
CWE-264
Permissions, Privileges, and Access Controls