Lucene search

K
freebsdFreeBSD3C7D565A-6C64-11E0-813A-6C626DD55A41
HistoryApr 21, 2011 - 12:00 a.m.

Asterisk -- multiple vulnerabilities

2011-04-2100:00:00
vuxml.freebsd.org
14

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.111 Low

EPSS

Percentile

95.1%

The Asterisk Development Team reports:

It is possible for a user of the Asterisk Manager Interface to
bypass a security check and execute shell commands when they
should not have that ability. Sending the “Async” header with
the “Application” header during an Originate action, allows
authenticated manager users to execute shell commands. Only
users with the “system” privilege should be able to do this.
On systems that have the Asterisk Manager Interface, Skinny, SIP
over TCP, or the built in HTTP server enabled, it is possible for
an attacker to open as many connections to asterisk as he wishes.
This will cause Asterisk to run out of available file descriptors
and stop processing any new calls. Additionally, disk space can
be exhausted as Asterisk logs failures to open new file
descriptors.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchasterisk14< 1.4.40.1UNKNOWN
FreeBSDanynoarchasterisk16< 1.6.2.17.3UNKNOWN
FreeBSDanynoarchasterisk18< 1.8.3.3UNKNOWN

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.111 Low

EPSS

Percentile

95.1%