CVE-2014-8412 (GCVE-0-2014-8412)
Vulnerability from cvelistv5 – Published: 2014-11-24 15:00 – Updated: 2024-08-06 13:18
VLAI?
Summary
The (1) VoIP channel drivers, (2) DUNDi, and (3) Asterisk Manager Interface (AMI) in Asterisk Open Source 1.8.x before 1.8.32.1, 11.x before 11.14.1, 12.x before 12.7.1, and 13.x before 13.0.1 and Certified Asterisk 1.8.28 before 1.8.28-cert3 and 11.6 before 11.6-cert8 allows remote attackers to bypass the ACL restrictions via a packet with a source IP that does not share the address family as the first ACL entry.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T13:18:48.295Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://downloads.asterisk.org/pub/security/AST-2014-012.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-11-20T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The (1) VoIP channel drivers, (2) DUNDi, and (3) Asterisk Manager Interface (AMI) in Asterisk Open Source 1.8.x before 1.8.32.1, 11.x before 11.14.1, 12.x before 12.7.1, and 13.x before 13.0.1 and Certified Asterisk 1.8.28 before 1.8.28-cert3 and 11.6 before 11.6-cert8 allows remote attackers to bypass the ACL restrictions via a packet with a source IP that does not share the address family as the first ACL entry."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-11-24T13:57:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://downloads.asterisk.org/pub/security/AST-2014-012.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-8412",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The (1) VoIP channel drivers, (2) DUNDi, and (3) Asterisk Manager Interface (AMI) in Asterisk Open Source 1.8.x before 1.8.32.1, 11.x before 11.14.1, 12.x before 12.7.1, and 13.x before 13.0.1 and Certified Asterisk 1.8.28 before 1.8.28-cert3 and 11.6 before 11.6-cert8 allows remote attackers to bypass the ACL restrictions via a packet with a source IP that does not share the address family as the first ACL entry."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://downloads.asterisk.org/pub/security/AST-2014-012.html",
"refsource": "CONFIRM",
"url": "http://downloads.asterisk.org/pub/security/AST-2014-012.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-8412",
"datePublished": "2014-11-24T15:00:00",
"dateReserved": "2014-10-22T00:00:00",
"dateUpdated": "2024-08-06T13:18:48.295Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:certified_asterisk:1.8.28:cert1:*:*:lts:*:*:*\", \"matchCriteriaId\": \"E63726F0-3BC6-49E7-BDE9-71196B480149\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:certified_asterisk:1.8.28:cert2:*:*:lts:*:*:*\", \"matchCriteriaId\": \"677AB746-AE4F-46B0-BEE3-82A1FE77271F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:certified_asterisk:1.8.28.0:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"C675C7BA-65E9-4A0A-9A6D-1EBCBEA1D718\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:lts:*:*:*\", \"matchCriteriaId\": \"6AD7C9B3-D029-4E05-8E80-3ADA904FAC1C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:lts:*:*:*\", \"matchCriteriaId\": \"CE71221B-4D55-4643-B6D1-307B2CF41F98\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:lts:*:*:*\", \"matchCriteriaId\": \"88124275-9BEB-4D53-9E4D-1AC8C52F2D0F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:certified_asterisk:11.6:cert4:*:*:lts:*:*:*\", \"matchCriteriaId\": \"4F3CEFEF-72B6-4B58-81FE-01BCEEFB3013\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:certified_asterisk:11.6:cert5:*:*:lts:*:*:*\", \"matchCriteriaId\": \"AA637187-0EAE-4756-AD72-A0B2FABCA070\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:certified_asterisk:11.6:cert6:*:*:lts:*:*:*\", \"matchCriteriaId\": \"6DAF6784-0B31-4104-9D85-473D5AFAB785\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:certified_asterisk:11.6:cert7:*:*:lts:*:*:*\", \"matchCriteriaId\": \"77B06B83-D62C-4A0E-BE94-83C9A02CE55A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:certified_asterisk:11.6.0:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"D6EE9895-FB94-451D-8701-8C0DD8F5BED0\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.8.0\", \"versionEndExcluding\": \"1.8.32.1\", \"matchCriteriaId\": \"50388096-3988-4931-B67B-156A9603E0EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.0.0\", \"versionEndExcluding\": \"11.14.1\", \"matchCriteriaId\": \"8CDFB271-72DA-4E23-87A0-E50EE633843F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.0.0\", \"versionEndExcluding\": \"12.7.1\", \"matchCriteriaId\": \"F21F0B73-A30F-4673-B3A8-D9F456FFCEF2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.0.0\", \"versionEndExcluding\": \"13.0.1\", \"matchCriteriaId\": \"0C83CD93-7CBA-4FF0-B29E-A509F4A3D5E2\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The (1) VoIP channel drivers, (2) DUNDi, and (3) Asterisk Manager Interface (AMI) in Asterisk Open Source 1.8.x before 1.8.32.1, 11.x before 11.14.1, 12.x before 12.7.1, and 13.x before 13.0.1 and Certified Asterisk 1.8.28 before 1.8.28-cert3 and 11.6 before 11.6-cert8 allows remote attackers to bypass the ACL restrictions via a packet with a source IP that does not share the address family as the first ACL entry.\"}, {\"lang\": \"es\", \"value\": \"(1) Los controladores de canales VoIP, (2) DUNDi, y (3) Asterisk Manager Interface (AMI) en Asterisk Open Source 1.8.x anterior a 1.8.32.1, 11.x anterior a 11.14.1, 12.x anterior a 12.7.1, y 13.x anterior a 13.0.1 y Certified Asterisk 1.8.28 anterior a 1.8.28-cert3 y 11.6 anterior a 11.6-cert8 permite a atacantes remotos evadir las restricciones ACL a trav\\u00e9s de un paquete con una fuente IP que no comparte la familia de direcciones como la primera entrada ACL.\"}]",
"id": "CVE-2014-8412",
"lastModified": "2024-11-21T02:19:01.960",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:P/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2014-11-24T15:59:04.140",
"references": "[{\"url\": \"http://downloads.asterisk.org/pub/security/AST-2014-012.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://downloads.asterisk.org/pub/security/AST-2014-012.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-264\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2014-8412\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2014-11-24T15:59:04.140\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The (1) VoIP channel drivers, (2) DUNDi, and (3) Asterisk Manager Interface (AMI) in Asterisk Open Source 1.8.x before 1.8.32.1, 11.x before 11.14.1, 12.x before 12.7.1, and 13.x before 13.0.1 and Certified Asterisk 1.8.28 before 1.8.28-cert3 and 11.6 before 11.6-cert8 allows remote attackers to bypass the ACL restrictions via a packet with a source IP that does not share the address family as the first ACL entry.\"},{\"lang\":\"es\",\"value\":\"(1) Los controladores de canales VoIP, (2) DUNDi, y (3) Asterisk Manager Interface (AMI) en Asterisk Open Source 1.8.x anterior a 1.8.32.1, 11.x anterior a 11.14.1, 12.x anterior a 12.7.1, y 13.x anterior a 13.0.1 y Certified Asterisk 1.8.28 anterior a 1.8.28-cert3 y 11.6 anterior a 11.6-cert8 permite a atacantes remotos evadir las restricciones ACL a trav\u00e9s de un paquete con una fuente IP que no comparte la familia de direcciones como la primera entrada ACL.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:certified_asterisk:1.8.28:cert1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"E63726F0-3BC6-49E7-BDE9-71196B480149\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:certified_asterisk:1.8.28:cert2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"677AB746-AE4F-46B0-BEE3-82A1FE77271F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:certified_asterisk:1.8.28.0:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"C675C7BA-65E9-4A0A-9A6D-1EBCBEA1D718\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:lts:*:*:*\",\"matchCriteriaId\":\"6AD7C9B3-D029-4E05-8E80-3ADA904FAC1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:lts:*:*:*\",\"matchCriteriaId\":\"CE71221B-4D55-4643-B6D1-307B2CF41F98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:lts:*:*:*\",\"matchCriteriaId\":\"88124275-9BEB-4D53-9E4D-1AC8C52F2D0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:certified_asterisk:11.6:cert4:*:*:lts:*:*:*\",\"matchCriteriaId\":\"4F3CEFEF-72B6-4B58-81FE-01BCEEFB3013\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:certified_asterisk:11.6:cert5:*:*:lts:*:*:*\",\"matchCriteriaId\":\"AA637187-0EAE-4756-AD72-A0B2FABCA070\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:certified_asterisk:11.6:cert6:*:*:lts:*:*:*\",\"matchCriteriaId\":\"6DAF6784-0B31-4104-9D85-473D5AFAB785\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:certified_asterisk:11.6:cert7:*:*:lts:*:*:*\",\"matchCriteriaId\":\"77B06B83-D62C-4A0E-BE94-83C9A02CE55A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:certified_asterisk:11.6.0:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"D6EE9895-FB94-451D-8701-8C0DD8F5BED0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.8.0\",\"versionEndExcluding\":\"1.8.32.1\",\"matchCriteriaId\":\"50388096-3988-4931-B67B-156A9603E0EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0.0\",\"versionEndExcluding\":\"11.14.1\",\"matchCriteriaId\":\"8CDFB271-72DA-4E23-87A0-E50EE633843F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.0.0\",\"versionEndExcluding\":\"12.7.1\",\"matchCriteriaId\":\"F21F0B73-A30F-4673-B3A8-D9F456FFCEF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0\",\"versionEndExcluding\":\"13.0.1\",\"matchCriteriaId\":\"0C83CD93-7CBA-4FF0-B29E-A509F4A3D5E2\"}]}]}],\"references\":[{\"url\":\"http://downloads.asterisk.org/pub/security/AST-2014-012.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://downloads.asterisk.org/pub/security/AST-2014-012.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…