Weak Authentication Affecting asterisk package, versions [,1.2.27)[1.4.0-beta1,1.4.19-rc3)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.97% (76th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-ASTERISK-2371521
  • published26 Jan 2022
  • disclosed20 Mar 2008
  • creditUnknown

Introduced: 20 Mar 2008

CVE-2008-1332  (opens in a new tab)
CWE-1390  (opens in a new tab)

How to fix?

Upgrade asterisk to version 1.2.27, 1.4.19-rc3 or higher.

Overview

Affected versions of this package are vulnerable to Weak Authentication. Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header.

References

CVSS Base Scores

version 3.1