Lucene search

K
cve[email protected]CVE-2010-1224
HistoryApr 01, 2010 - 9:30 p.m.

CVE-2010-1224

2010-04-0121:30:00
CWE-264
web.nvd.nist.gov
42
asterisk
open source
cve-2010-1224
access control
remote attack

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.8 Medium

AI Score

Confidence

Low

0.012 Low

EPSS

Percentile

85.2%

main/acl.c in Asterisk Open Source 1.6.0.x before 1.6.0.25, 1.6.1.x before 1.6.1.17, and 1.6.2.x before 1.6.2.5 does not properly enforce remote host access controls when CIDR notation “/0” is used in permit= and deny= configuration rules, which causes an improper arithmetic shift and might allow remote attackers to bypass ACL rules and access services from unauthorized hosts.

Affected configurations

NVD
Node
digiumasteriskMatch1.6.0
OR
digiumasteriskMatch1.6.0.1
OR
digiumasteriskMatch1.6.0.2
OR
digiumasteriskMatch1.6.0.3
OR
digiumasteriskMatch1.6.0.5
OR
digiumasteriskMatch1.6.0.6
OR
digiumasteriskMatch1.6.0.7
OR
digiumasteriskMatch1.6.0.8
OR
digiumasteriskMatch1.6.0.9
OR
digiumasteriskMatch1.6.0.10
OR
digiumasteriskMatch1.6.0.12
OR
digiumasteriskMatch1.6.0.13
OR
digiumasteriskMatch1.6.0.14
OR
digiumasteriskMatch1.6.0.15
OR
digiumasteriskMatch1.6.0.16rc1
OR
digiumasteriskMatch1.6.0.16rc2
OR
digiumasteriskMatch1.6.0.17
OR
digiumasteriskMatch1.6.0.18
OR
digiumasteriskMatch1.6.0.18rc1
OR
digiumasteriskMatch1.6.0.18rc2
OR
digiumasteriskMatch1.6.0.18rc3
OR
digiumasteriskMatch1.6.0.19
OR
digiumasteriskMatch1.6.0.20rc1
OR
digiumasteriskMatch1.6.0.21
OR
digiumasteriskMatch1.6.0.21rc1
OR
digiumasteriskMatch1.6.0.22
OR
digiumasteriskMatch1.6.0.23rc2
OR
digiumasteriskMatch1.6.0.24
OR
digiumasteriskMatch1.6.1
OR
digiumasteriskMatch1.6.1.1
OR
digiumasteriskMatch1.6.1.2
OR
digiumasteriskMatch1.6.1.4
OR
digiumasteriskMatch1.6.1.5
OR
digiumasteriskMatch1.6.1.6
OR
digiumasteriskMatch1.6.1.7rc1
OR
digiumasteriskMatch1.6.1.7rc2
OR
digiumasteriskMatch1.6.1.8
OR
digiumasteriskMatch1.6.1.9
OR
digiumasteriskMatch1.6.1.10
OR
digiumasteriskMatch1.6.1.10rc1
OR
digiumasteriskMatch1.6.1.10rc2
OR
digiumasteriskMatch1.6.1.10rc3
OR
digiumasteriskMatch1.6.1.11
OR
digiumasteriskMatch1.6.1.12
OR
digiumasteriskMatch1.6.1.12rc1
OR
digiumasteriskMatch1.6.1.13
OR
digiumasteriskMatch1.6.1.13rc1
OR
digiumasteriskMatch1.6.1.14
OR
digiumasteriskMatch1.6.1.15rc2
OR
digiumasteriskMatch1.6.1.16
OR
digiumasteriskMatch1.6.2.0
OR
digiumasteriskMatch1.6.2.0rc2
OR
digiumasteriskMatch1.6.2.0rc3
OR
digiumasteriskMatch1.6.2.0rc4
OR
digiumasteriskMatch1.6.2.0rc5
OR
digiumasteriskMatch1.6.2.0rc6
OR
digiumasteriskMatch1.6.2.0rc7
OR
digiumasteriskMatch1.6.2.0rc8
OR
digiumasteriskMatch1.6.2.1
OR
digiumasteriskMatch1.6.2.1rc1
OR
digiumasteriskMatch1.6.2.2
OR
digiumasteriskMatch1.6.2.3rc2
OR
digiumasteriskMatch1.6.2.4

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.8 Medium

AI Score

Confidence

Low

0.012 Low

EPSS

Percentile

85.2%