CVE-2010-0685
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
23/02/2010
Last modified:
11/04/2025
Description
The design of the dialplan functionality in Asterisk Open Source 1.2.x, 1.4.x, and 1.6.x; and Asterisk Business Edition B.x.x and C.x.x, when using the ${EXTEN} channel variable and wildcard pattern matches, allows context-dependent attackers to inject strings into the dialplan using metacharacters that are injected when the variable is expanded, as demonstrated using the Dial application to process a crafted SIP INVITE message that adds an unintended outgoing channel leg. NOTE: it could be argued that this is not a vulnerability in Asterisk, but a class of vulnerabilities that can occur in any program that uses this feature without the associated filtering functionality that is already available.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:digium:asterisk:1.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.2.0:beta1:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.2.0:beta2:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.2.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.2.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.2.2:netsec:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.2.3:netsec:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.2.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.2.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.2.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.2.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:digium:asterisk:1.2.10:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://downloads.digium.com/pub/security/AST-2010-002.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037679.html
- http://secunia.com/advisories/38641
- http://secunia.com/advisories/39096
- http://svn.asterisk.org/svn/asterisk/branches/1.2/README-SERIOUSLY.bestpractices.txt
- http://www.securityfocus.com/archive/1/509608/100/0/threaded
- http://www.securitytracker.com/id?1023637=
- http://www.vupen.com/english/advisories/2010/0439
- https://exchange.xforce.ibmcloud.com/vulnerabilities/56397
- http://downloads.digium.com/pub/security/AST-2010-002.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037679.html
- http://secunia.com/advisories/38641
- http://secunia.com/advisories/39096
- http://svn.asterisk.org/svn/asterisk/branches/1.2/README-SERIOUSLY.bestpractices.txt
- http://www.securityfocus.com/archive/1/509608/100/0/threaded
- http://www.securitytracker.com/id?1023637=
- http://www.vupen.com/english/advisories/2010/0439
- https://exchange.xforce.ibmcloud.com/vulnerabilities/56397



