The res_pjsip_acl module in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1 does not properly create and load ACLs defined in pjsip.conf at startup, which allows remote attackers to bypass intended PJSIP ACL rules.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
http://downloads.asterisk.org/pub/security/AST-2014-013.html |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T13:18:48.273Z
Reserved: 2014-10-22T00:00:00
Link: CVE-2014-8413

No data.

Status : Modified
Published: 2014-11-24T15:59:05.310
Modified: 2024-11-21T02:19:02.120
Link: CVE-2014-8413

No data.