CVE-2018-12227
Summary
| CVE | CVE-2018-12227 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-06-12 04:29:00 UTC |
| Updated | 2019-03-29 16:22:00 UTC |
| Description | An issue was discovered in Asterisk Open Source 13.x before 13.21.1, 14.x before 14.7.7, and 15.x before 15.4.1 and Certified Asterisk 13.18-cert before 13.18-cert4 and 13.21-cert before 13.21-cert2. When endpoint specific ACL rules block a SIP request, they respond with a 403 forbidden. However, if an endpoint is not identified, then a 401 unauthorized response is sent. This vulnerability just discloses which requests hit a defined endpoint. The ACL rules cannot be bypassed to gain access to the disclosed endpoints. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| [ASTERISK-27818] Username bruteforce is possible when using ACL with PJSIP - Digium/Asterisk JIRA |
CONFIRM |
issues.asterisk.org |
Patch, Vendor Advisory |
| AST-2018-008 |
CONFIRM |
downloads.asterisk.org |
Vendor Advisory |
| Debian -- Security Information -- DSA-4320-1 asterisk |
DEBIAN |
www.debian.org |
Third Party Advisory |
| Multiple Asterisk Products CVE-2018-12227 Information Disclosure Vulnerability |
BID |
www.securityfocus.com |
Third Party Advisory, VDB Entry |
| Asterisk: Multiple vulnerabilities (GLSA 201811-11) — Gentoo security |
GENTOO |
security.gentoo.org |
Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 710292 Gentoo Linux Asterisk Multiple Vulnerabilities (GLSA 201811-11)