CVE-2012-4737

Source
https://nvd.nist.gov/vuln/detail/CVE-2012-4737
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2012-4737.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2012-4737
Published
2012-08-31T14:55:01Z
Modified
2025-04-11T00:51:21Z
Downstream
Summary
[none]
Details

channels/chan_iax2.c in Asterisk Open Source 1.8.x before 1.8.15.1 and 10.x before 10.7.1, Certified Asterisk 1.8.11 before 1.8.11-cert7, Asterisk Digiumphones 10.x.x-digiumphones before 10.7.1-digiumphones, and Asterisk Business Edition C.3.x before C.3.7.6 does not enforce ACL rules during certain uses of peer credentials, which allows remote authenticated users to bypass intended outbound-call restrictions by leveraging the availability of these credentials.

References

Affected packages

Debian:11 / asterisk

Package

Name
asterisk
Purl
pkg:deb/debian/asterisk?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:1.8.13.1~dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}