Access Restriction Bypass Affecting asterisk package, versions <1:13.1.0~dfsg-1


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.26% (66th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN11-ASTERISK-518258
  • published24 Nov 2014
  • disclosed24 Nov 2014

Introduced: 24 Nov 2014

CVE-2014-8418  (opens in a new tab)
CWE-264  (opens in a new tab)

How to fix?

Upgrade Debian:11 asterisk to version 1:13.1.0~dfsg-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream asterisk package and not the asterisk package as distributed by Debian. See How to fix? for Debian:11 relevant fixed versions and status.

The DB dialplan function in Asterisk Open Source 1.8.x before 1.8.32, 11.x before 11.1.4.1, 12.x before 12.7.1, and 13.x before 13.0.1 and Certified Asterisk 1.8 before 1.8.28-cert8 and 11.6 before 11.6-cert8 allows remote authenticated users to gain privileges via a call from an external protocol, as demonstrated by the AMI protocol.

CVSS Scores

version 3.1