CVE-2014-8412

EUVD-2014-8249
The (1) VoIP channel drivers, (2) DUNDi, and (3) Asterisk Manager Interface (AMI) in Asterisk Open Source 1.8.x before 1.8.32.1, 11.x before 11.14.1, 12.x before 12.7.1, and 13.x before 13.0.1 and Certified Asterisk 1.8.28 before 1.8.28-cert3 and 11.6 before 11.6-cert8 allows remote attackers to bypass the ACL restrictions via a packet with a source IP that does not share the address family as the first ACL entry.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 68%
Affected Products (NVD)
VendorProductVersion
digiumcertified_asterisk
1.8.28:cert1
digiumcertified_asterisk
1.8.28:cert2
digiumcertified_asterisk
1.8.28.0
digiumcertified_asterisk
11.6:cert1
digiumcertified_asterisk
11.6:cert2
digiumcertified_asterisk
11.6:cert3
digiumcertified_asterisk
11.6:cert4
digiumcertified_asterisk
11.6:cert5
digiumcertified_asterisk
11.6:cert6
digiumcertified_asterisk
11.6:cert7
digiumcertified_asterisk
11.6.0
digiumasterisk
1.8.0 ≤
𝑥
< 1.8.32.1
digiumasterisk
11.0.0 ≤
𝑥
< 11.14.1
digiumasterisk
12.0.0 ≤
𝑥
< 12.7.1
digiumasterisk
13.0.0 ≤
𝑥
< 13.0.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
asterisk
bullseye
1:16.28.0~dfsg-0+deb11u4
fixed
bullseye (security)
1:16.28.0~dfsg-0+deb11u5
fixed
sid
1:22.0.0~dfsg+~cs6.14.60671435-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
asterisk
artful
not-affected
bionic
not-affected
cosmic
not-affected
disco
not-affected
lucid
ignored
precise
ignored
trusty
dne
utopic
ignored
vivid
not-affected
wily
not-affected
xenial
not-affected
yakkety
not-affected
zesty
not-affected
Common Weakness Enumeration