Vulnerability Name:

CVE-2010-1224 (CCN-56552)

Assigned:2010-02-24
Published:2010-02-24
Updated:2018-10-10
Summary:main/acl.c in Asterisk Open Source 1.6.0.x before 1.6.0.25, 1.6.1.x before 1.6.1.17, and 1.6.2.x before 1.6.2.5 does not properly enforce remote host access controls when CIDR notation "/0" is used in permit= and deny= configuration rules, which causes an improper arithmetic shift and might allow remote attackers to bypass ACL rules and access services from unauthorized hosts.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.2 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-264
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2010-1224

Source: CONFIRM
Type: UNKNOWN
http://downloads.asterisk.org/pub/security/AST-2010-003-1.6.0.diff

Source: CONFIRM
Type: UNKNOWN
http://downloads.asterisk.org/pub/security/AST-2010-003-1.6.1.diff

Source: CONFIRM
Type: Patch
http://downloads.asterisk.org/pub/security/AST-2010-003-1.6.2.diff

Source: CCN
Type: AST-2010-003
Invalid parsing of ACL rules can compromise security

Source: CONFIRM
Type: UNKNOWN
http://downloads.asterisk.org/pub/security/AST-2010-003.html

Source: FEDORA
Type: UNKNOWN
FEDORA-2010-3724

Source: OSVDB
Type: UNKNOWN
62588

Source: CCN
Type: SA38752
Asterisk CIDR Host Access Rules Security Bypass

Source: SECUNIA
Type: Vendor Advisory
38752

Source: SECUNIA
Type: UNKNOWN
39096

Source: CCN
Type: OSVDB ID: 62588
Asterisk main/acl.c CIDR Notation Host Access Restriction Bypass

Source: BUGTRAQ
Type: UNKNOWN
20100225 AST-2010-003: Invalid parsing of ACL rules can compromise security

Source: BID
Type: UNKNOWN
38424

Source: CCN
Type: BID-38424
Asterisk CIDR Notation in Access Rule Remote Security Bypass Vulnerability

Source: VUPEN
Type: Vendor Advisory
ADV-2010-0475

Source: XF
Type: UNKNOWN
asterisk-cidr-security-bypass(56552)

Source: XF
Type: UNKNOWN
asterisk-cidr-security-bypass(56552)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:digium:asterisk:1.6.0:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.0.13:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.0.14:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.0.15:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.0.16:rc1:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.0.16:rc2:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.0.17:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.0.18:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.0.18:rc1:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.0.18:rc2:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.0.18:rc3:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.0.19:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.0.20:rc1:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.0.21:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.0.21:rc1:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.0.22:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.0.23:rc2:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.0.24:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.1.7:rc1:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.1.7:rc2:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.1.8:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.1.9:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.1.10:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.1.10:rc1:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.1.10:rc2:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.1.10:rc3:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.1.11:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.1.12:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.1.12:rc1:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.1.13:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.1.13:rc1:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.1.14:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.1.15:rc2:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.1.16:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.2.0:rc2:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.2.0:rc3:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.2.0:rc4:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.2.0:rc5:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.2.0:rc6:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.2.0:rc7:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.2.0:rc8:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.2.1:rc1:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.2.3:rc2:*:*:*:*:*:*
  • OR cpe:/a:digium:asterisk:1.6.2.4:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    digium asterisk 1.6.0
    digium asterisk 1.6.0.1
    digium asterisk 1.6.0.2
    digium asterisk 1.6.0.3
    digium asterisk 1.6.0.5
    digium asterisk 1.6.0.6
    digium asterisk 1.6.0.7
    digium asterisk 1.6.0.8
    digium asterisk 1.6.0.9
    digium asterisk 1.6.0.10
    digium asterisk 1.6.0.12
    digium asterisk 1.6.0.13
    digium asterisk 1.6.0.14
    digium asterisk 1.6.0.15
    digium asterisk 1.6.0.16 rc1
    digium asterisk 1.6.0.16 rc2
    digium asterisk 1.6.0.17
    digium asterisk 1.6.0.18
    digium asterisk 1.6.0.18 rc1
    digium asterisk 1.6.0.18 rc2
    digium asterisk 1.6.0.18 rc3
    digium asterisk 1.6.0.19
    digium asterisk 1.6.0.20 rc1
    digium asterisk 1.6.0.21
    digium asterisk 1.6.0.21 rc1
    digium asterisk 1.6.0.22
    digium asterisk 1.6.0.23 rc2
    digium asterisk 1.6.0.24
    digium asterisk 1.6.1
    digium asterisk 1.6.1.1
    digium asterisk 1.6.1.2
    digium asterisk 1.6.1.4
    digium asterisk 1.6.1.5
    digium asterisk 1.6.1.6
    digium asterisk 1.6.1.7 rc1
    digium asterisk 1.6.1.7 rc2
    digium asterisk 1.6.1.8
    digium asterisk 1.6.1.9
    digium asterisk 1.6.1.10
    digium asterisk 1.6.1.10 rc1
    digium asterisk 1.6.1.10 rc2
    digium asterisk 1.6.1.10 rc3
    digium asterisk 1.6.1.11
    digium asterisk 1.6.1.12
    digium asterisk 1.6.1.12 rc1
    digium asterisk 1.6.1.13
    digium asterisk 1.6.1.13 rc1
    digium asterisk 1.6.1.14
    digium asterisk 1.6.1.15 rc2
    digium asterisk 1.6.1.16
    digium asterisk 1.6.2.0
    digium asterisk 1.6.2.0 rc2
    digium asterisk 1.6.2.0 rc3
    digium asterisk 1.6.2.0 rc4
    digium asterisk 1.6.2.0 rc5
    digium asterisk 1.6.2.0 rc6
    digium asterisk 1.6.2.0 rc7
    digium asterisk 1.6.2.0 rc8
    digium asterisk 1.6.2.1
    digium asterisk 1.6.2.1 rc1
    digium asterisk 1.6.2.2
    digium asterisk 1.6.2.3 rc2
    digium asterisk 1.6.2.4