Vulnerability CVE-2010-0685


Published: 2010-02-23   Modified: 2012-02-13

Description:
The design of the dialplan functionality in Asterisk Open Source 1.2.x, 1.4.x, and 1.6.x; and Asterisk Business Edition B.x.x and C.x.x, when using the ${EXTEN} channel variable and wildcard pattern matches, allows context-dependent attackers to inject strings into the dialplan using metacharacters that are injected when the variable is expanded, as demonstrated using the Dial application to process a crafted SIP INVITE message that adds an unintended outgoing channel leg. NOTE: it could be argued that this is not a vulnerability in Asterisk, but a class of vulnerabilities that can occur in any program that uses this feature without the associated filtering functionality that is already available.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Dialplan 2.5.3 injection vulnerability
Asterisk Securit...
26.02.2010

Type:

CWE-Other

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Digium -> Asterisk 

 References:
http://downloads.digium.com/pub/security/AST-2010-002.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037679.html
http://svn.asterisk.org/svn/asterisk/branches/1.2/README-SERIOUSLY.bestpractices.txt
http://www.securityfocus.com/archive/1/509608/100/0/threaded
http://www.securitytracker.com/id?1023637
http://www.vupen.com/english/advisories/2010/0439
https://exchange.xforce.ibmcloud.com/vulnerabilities/56397

Copyright 2024, cxsecurity.com

 

Back to Top