Vulnerabilities > Digium > Asterisk > 12.4.0

DATE CVE VULNERABILITY TITLE RISK
2014-12-12 CVE-2014-9374 Denial of Service vulnerability in Multiple Asterisk Products WebSocket Server
Double free vulnerability in the WebSocket Server (res_http_websocket module) in Asterisk Open Source 11.x before 11.14.2, 12.x before 12.7.2, and 13.x before 13.0.2 and Certified Asterisk 11.6 before 11.6-cert9 allows remote attackers to cause a denial of service (crash) by sending a zero length frame after a non-zero length frame.
network
low complexity
digium
5.0
2014-11-26 CVE-2014-6610 Data Processing Errors vulnerability in Digium Asterisk and Certified Asterisk
Asterisk Open Source 11.x before 11.12.1 and 12.x before 12.5.1 and Certified Asterisk 11.6 before 11.6-cert6, when using the res_fax_spandsp module, allows remote authenticated users to cause a denial of service (crash) via an out of call message, which is not properly handled in the ReceiveFax dialplan application.
network
low complexity
digium CWE-19
4.0
2014-11-26 CVE-2014-6609 Improper Input Validation vulnerability in Digium Asterisk
The res_pjsip_pubsub module in Asterisk Open Source 12.x before 12.5.1 allows remote authenticated users to cause a denial of service (crash) via crafted headers in a SIP SUBSCRIBE request for an event package.
network
low complexity
digium CWE-20
4.0
2014-11-24 CVE-2014-8418 Permissions, Privileges, and Access Controls vulnerability in Digium Asterisk and Certified Asterisk
The DB dialplan function in Asterisk Open Source 1.8.x before 1.8.32, 11.x before 11.1.4.1, 12.x before 12.7.1, and 13.x before 13.0.1 and Certified Asterisk 1.8 before 1.8.28-cert8 and 11.6 before 11.6-cert8 allows remote authenticated users to gain privileges via a call from an external protocol, as demonstrated by the AMI protocol.
network
low complexity
digium CWE-264
critical
9.0
2014-11-24 CVE-2014-8417 Permissions, Privileges, and Access Controls vulnerability in Digium Asterisk and Certified Asterisk
ConfBridge in Asterisk 11.x before 11.14.1, 12.x before 12.7.1, and 13.x before 13.0.1 and Certified Asterisk 11.6 before 11.6-cert8 allows remote authenticated users to (1) gain privileges via vectors related to an external protocol to the CONFBRIDGE dialplan function or (2) execute arbitrary system commands via a crafted ConfbridgeStartRecord AMI action.
network
low complexity
digium CWE-264
6.5
2014-11-24 CVE-2014-8416 Improper Input Validation vulnerability in Digium Asterisk
Use-after-free vulnerability in the PJSIP channel driver in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1, when using the res_pjsip_refer module, allows remote attackers to cause a denial of service (crash) via an in-dialog INVITE with Replaces message, which triggers the channel to be hung up.
network
low complexity
digium CWE-20
5.0
2014-11-24 CVE-2014-8415 Improper Input Validation vulnerability in Digium Asterisk
Race condition in the chan_pjsip channel driver in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1 allows remote attackers to cause a denial of service (assertion failure and crash) via a cancel request for a SIP session with a queued action to (1) answer a session or (2) send ringing.
network
low complexity
digium CWE-20
5.0
2014-11-24 CVE-2014-8413 Permissions, Privileges, and Access Controls vulnerability in Digium Asterisk
The res_pjsip_acl module in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1 does not properly create and load ACLs defined in pjsip.conf at startup, which allows remote attackers to bypass intended PJSIP ACL rules.
network
low complexity
digium CWE-264
7.5
2014-11-24 CVE-2014-8412 Permissions, Privileges, and Access Controls vulnerability in Digium Asterisk and Certified Asterisk
The (1) VoIP channel drivers, (2) DUNDi, and (3) Asterisk Manager Interface (AMI) in Asterisk Open Source 1.8.x before 1.8.32.1, 11.x before 11.14.1, 12.x before 12.7.1, and 13.x before 13.0.1 and Certified Asterisk 1.8.28 before 1.8.28-cert3 and 11.6 before 11.6-cert8 allows remote attackers to bypass the ACL restrictions via a packet with a source IP that does not share the address family as the first ACL entry.
network
low complexity
digium CWE-264
5.0