The res_pjsip_acl module in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1 does not properly create and load ACLs defined in pjsip.conf at startup, which allows remote attackers to bypass intended PJSIP ACL rules.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
http://downloads.asterisk.org/pub/security/AST-2014-013.html |
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2014-11-24T15:00:00
Updated: 2024-08-06T13:18:48.273Z
Reserved: 2014-10-22T00:00:00
Link: CVE-2014-8413
Vulnrichment
No data.
NVD
Status : Modified
Published: 2014-11-24T15:59:05.310
Modified: 2024-11-21T02:19:02.120
Link: CVE-2014-8413
Redhat
No data.