CVE-2014-8413 in Asteriskinfo

Summary

The res_pjsip_acl module in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1 does properly create and load ACLs defined in pjsip.conf at startup, which allows remote attackers to bypass intended PJSIP ACL rules.

Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

Reservation

10/22/2014

Disclosure

11/24/2014

Status

Confirmed

Entries

VulDB provides additional information and datapoints for this CVE:

Sources

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!