[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249982

 
 

909

 
 

195748

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2010-0685Date: (C)2010-02-23   (M)2023-12-22


The design of the dialplan functionality in Asterisk Open Source 1.2.x, 1.4.x, and 1.6.x; and Asterisk Business Edition B.x.x and C.x.x, when using the ${EXTEN} channel variable and wildcard pattern matches, allows context-dependent attackers to inject strings into the dialplan using metacharacters that are injected when the variable is expanded, as demonstrated using the Dial application to process a crafted SIP INVITE message that adds an unintended outgoing channel leg. NOTE: it could be argued that this is not a vulnerability in Asterisk, but a class of vulnerabilities that can occur in any program that uses this feature without the associated filtering functionality that is already available.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: NONE
Integrity: PARTIAL
Availability: NONE
  
Reference:
SECTRACK-1023637
http://www.securityfocus.com/archive/1/509608/100/0/threaded
SECUNIA-38641
SECUNIA-39096
ADV-2010-0439
FEDORA-2010-3724
asterisk-dial-weak-security(56397)
http://downloads.digium.com/pub/security/AST-2010-002.html
http://svn.asterisk.org/svn/asterisk/branches/1.2/README-SERIOUSLY.bestpractices.txt

CPE    126
cpe:/a:digium:asterisk:1.2.31.1
cpe:/a:digium:asterisk:1.2.29
cpe:/a:digium:asterisk:c.1.6.2:-:business
cpe:/a:digium:asterisk:1.2.10:netsec
...

© SecPod Technologies