CVE-2010-1224
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
01/04/2010
Last modified:
11/04/2025
Description
main/acl.c in Asterisk Open Source 1.6.0.x before 1.6.0.25, 1.6.1.x before 1.6.1.17, and 1.6.2.x before 1.6.2.5 does not properly enforce remote host access controls when CIDR notation "/0" is used in permit= and deny= configuration rules, which causes an improper arithmetic shift and might allow remote attackers to bypass ACL rules and access services from unauthorized hosts.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:digium:asterisk:1.6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.6.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.6.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.6.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.6.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.6.0.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.6.0.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.6.0.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.6.0.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.6.0.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.6.0.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.6.0.13:*:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.6.0.14:*:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.6.0.15:*:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.6.0.16:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://downloads.asterisk.org/pub/security/AST-2010-003-1.6.0.diff
- http://downloads.asterisk.org/pub/security/AST-2010-003-1.6.1.diff
- http://downloads.asterisk.org/pub/security/AST-2010-003-1.6.2.diff
- http://downloads.asterisk.org/pub/security/AST-2010-003.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037679.html
- http://osvdb.org/62588
- http://secunia.com/advisories/38752
- http://secunia.com/advisories/39096
- http://www.securityfocus.com/archive/1/509757/100/0/threaded
- http://www.securityfocus.com/bid/38424
- http://www.vupen.com/english/advisories/2010/0475
- https://exchange.xforce.ibmcloud.com/vulnerabilities/56552
- http://downloads.asterisk.org/pub/security/AST-2010-003-1.6.0.diff
- http://downloads.asterisk.org/pub/security/AST-2010-003-1.6.1.diff
- http://downloads.asterisk.org/pub/security/AST-2010-003-1.6.2.diff
- http://downloads.asterisk.org/pub/security/AST-2010-003.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037679.html
- http://osvdb.org/62588
- http://secunia.com/advisories/38752
- http://secunia.com/advisories/39096
- http://www.securityfocus.com/archive/1/509757/100/0/threaded
- http://www.securityfocus.com/bid/38424
- http://www.vupen.com/english/advisories/2010/0475
- https://exchange.xforce.ibmcloud.com/vulnerabilities/56552



