Access Restriction Bypass Affecting asterisk package, versions [,a][a,b.2.5.0][b.2.5.0,c.1.6.1][c.1.6.1,1.0.1][1.0.1,1.2.26][1.2.26,1.4][1.4,1.4.17][1.4.17,1.4.19.1)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
75.35% (99th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-ASTERISK-2371521
  • published26 Jan 2022
  • disclosed20 Mar 2008
  • creditUnknown

Introduced: 20 Mar 2008

CVE-2008-1332  (opens in a new tab)
CWE-264  (opens in a new tab)

How to fix?

Upgrade asterisk to version 1.4.19.1 or higher.

Overview

Affected versions of this package are vulnerable to Access Restriction Bypass. Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header.

References

CVSS Scores

version 3.1