製品・ソフトウェアに関する情報
Asterisk Open Source のダイアルプラン機能のデザインにおけるダイアルプランへ文字列を挿入される脆弱性
Title Asterisk Open Source のダイアルプラン機能のデザインにおけるダイアルプランへ文字列を挿入される脆弱性
Summary

Asterisk Open Source および Asterisk Business Edition のダイアルプラン機能のデザインには、${EXTEN} チャネル変数およびワイルドカードパターン照合を使用されている際、ダイアルプランへ文字列を挿入される脆弱性が存在します。

Possible impacts 攻撃者により、変数が拡張された際、挿入されたメタキャラクタを使用されることで、ダイアルプランへ文字列を挿入される可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date Feb. 10, 2010, midnight
Registration Date June 26, 2012, 4:19 p.m.
Last Update June 26, 2012, 4:19 p.m.
CVSS2.0 : 警告
Score 5
Vector AV:N/AC:L/Au:N/C:N/I:P/A:N
Affected System
Digium
Asterisk Open Source 1.2.x、1.4.x、および 1.6.x、Business Edition の B.x.x および C.x.x
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
0 [2012年06月26日]
  掲載
Feb. 17, 2018, 10:37 a.m.

NVD Vulnerability Information
CVE-2010-0685
Summary

The design of the dialplan functionality in Asterisk Open Source 1.2.x, 1.4.x, and 1.6.x; and Asterisk Business Edition B.x.x and C.x.x, when using the ${EXTEN} channel variable and wildcard pattern matches, allows context-dependent attackers to inject strings into the dialplan using metacharacters that are injected when the variable is expanded, as demonstrated using the Dial application to process a crafted SIP INVITE message that adds an unintended outgoing channel leg. NOTE: it could be argued that this is not a vulnerability in Asterisk, but a class of vulnerabilities that can occur in any program that uses this feature without the associated filtering functionality that is already available.

Publication Date Feb. 24, 2010, 5:30 a.m.
Registration Date Jan. 29, 2021, 10:57 a.m.
Last Update Oct. 11, 2018, 4:53 a.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:digium:asterisk:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.0:beta1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.0:beta2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.2:netsec:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.3:netsec:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.8:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.9:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.10:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.10:netsec:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.11:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.11:netsec:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.12:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.12:netsec:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.12.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.12.1:netsec:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.13:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.13:netsec:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.14:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.15:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.15:netsec:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.16:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.16:netsec:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.17:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.17:netsec:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.18:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.18:netsec:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.19:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.19:netsec:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.20:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.20:netsec:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.21:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.21:netsec:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.21.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.21.1:netsec:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.22:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.22:netsec:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.23:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.23:netsec:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.24:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.24:netsec:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.25:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.25:netsec:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.26:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.26:netsec:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.26.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.26.1:netsec:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.26.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.26.2:netsec:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.27:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.28:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.28.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.29:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.30:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.30.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.30.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.30.3:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.30.4:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.31:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.31.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.32:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.33:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.34:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.35:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.2.36:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.5:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.6:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.7:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.8:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.9:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.10:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.11:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.12:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.13:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.14:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.15:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.16:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.17:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.18:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.19:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.20:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.21:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.22:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.23:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.24:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.25:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.26:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.4.27:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:1.6.1:*:*:*:*:*:*:*
Configuration2 or higher or less more than less than
cpe:2.3:a:digium:asterisk:b.1.3.2:-:business:*:*:*:*:*
cpe:2.3:a:digium:asterisk:b.1.3.3:-:business:*:*:*:*:*
cpe:2.3:a:digium:asterisk:b.2.2.0:-:business:*:*:*:*:*
cpe:2.3:a:digium:asterisk:b.2.2.1:-:business:*:*:*:*:*
cpe:2.3:a:digium:asterisk:b.2.3.1:-:business:*:*:*:*:*
cpe:2.3:a:digium:asterisk:b.2.3.2:-:business:*:*:*:*:*
cpe:2.3:a:digium:asterisk:b.2.3.3:-:business:*:*:*:*:*
cpe:2.3:a:digium:asterisk:b.2.3.4:-:business:*:*:*:*:*
cpe:2.3:a:digium:asterisk:b.2.3.5:-:business:*:*:*:*:*
cpe:2.3:a:digium:asterisk:b.2.3.6:-:business:*:*:*:*:*
cpe:2.3:a:digium:asterisk:b.2.5.0:-:business:*:*:*:*:*
cpe:2.3:a:digium:asterisk:b.2.5.1:-:business:*:*:*:*:*
cpe:2.3:a:digium:asterisk:b.2.5.2:-:business:*:*:*:*:*
cpe:2.3:a:digium:asterisk:b.2.5.3:-:business:*:*:*:*:*
cpe:2.3:a:digium:asterisk:c.1.0:beta7:business:*:*:*:*:*
cpe:2.3:a:digium:asterisk:c.1.0:beta8:business:*:*:*:*:*
cpe:2.3:a:digium:asterisk:c.1.6:-:business:*:*:*:*:*
cpe:2.3:a:digium:asterisk:c.1.6.1:-:business:*:*:*:*:*
cpe:2.3:a:digium:asterisk:c.1.6.2:-:business:*:*:*:*:*
cpe:2.3:a:digium:asterisk:c.1.8.0:-:business:*:*:*:*:*
cpe:2.3:a:digium:asterisk:c.1.8.1:-:business:*:*:*:*:*
cpe:2.3:a:digium:asterisk:c.2.3:-:business:*:*:*:*:*
cpe:2.3:a:digium:asterisk:c.3.0:-:business:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List