First published: Tue Jun 12 2018(Updated: )
An issue was discovered in Asterisk Open Source 13.x before 13.21.1, 14.x before 14.7.7, and 15.x before 15.4.1 and Certified Asterisk 13.18-cert before 13.18-cert4 and 13.21-cert before 13.21-cert2. When endpoint specific ACL rules block a SIP request, they respond with a 403 forbidden. However, if an endpoint is not identified, then a 401 unauthorized response is sent. This vulnerability just discloses which requests hit a defined endpoint. The ACL rules cannot be bypassed to gain access to the disclosed endpoints.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/asterisk | 1:16.2.1~dfsg-1+deb10u2 1:16.28.0~dfsg-0+deb10u3 1:16.28.0~dfsg-0+deb11u3 1:20.4.0~dfsg+~cs6.13.40431414-2 | |
Digium Asterisk | >=13.0.0<13.21.1 | |
Digium Asterisk | >14.0.0<14.7.7 | |
Digium Asterisk | >=15.0.0<15.4.1 | |
Digium Certified Asterisk | =13.18-cert1 | |
Digium Certified Asterisk | =13.18-cert2 | |
Digium Certified Asterisk | =13.18-cert3 | |
Digium Certified Asterisk | =13.21-cert1 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-12227 is medium with a severity value of 5.3.
The affected software for CVE-2018-12227 includes Asterisk Open Source versions 13.x, 14.x, and 15.x, as well as Certified Asterisk versions 13.18-cert and 13.21-cert.
CVE-2018-12227 in Asterisk Open Source allows endpoint specific ACL rules to respond with a 403 forbidden error when blocking a SIP request.
To fix CVE-2018-12227 vulnerability, it is recommended to upgrade to the patched versions of Asterisk Open Source and Certified Asterisk.
You can find more information about CVE-2018-12227 on the Asterisk security advisory page and Debian security tracker.