CVE-2018-12227

Priority
Description
An issue was discovered in Asterisk Open Source 13.x before 13.21.1, 14.x
before 14.7.7, and 15.x before 15.4.1 and Certified Asterisk 13.18-cert
before 13.18-cert4 and 13.21-cert before 13.21-cert2. When endpoint
specific ACL rules block a SIP request, they respond with a 403 forbidden.
However, if an endpoint is not identified, then a 401 unauthorized response
is sent. This vulnerability just discloses which requests hit a defined
endpoint. The ACL rules cannot be bypassed to gain access to the disclosed
endpoints.
Notes
Package
Upstream:released (1:13.22.0~dfsg-1, 1:13.14.1~dfsg-2+deb9u4, 1:16.2.1~dfsg-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):needed
Ubuntu 19.10 (Eoan Ermine):not-affected (1:16.2.1~dfsg-1)
Ubuntu 20.04 (Focal Fossa):not-affected (1:16.2.1~dfsg-1)
Patches:
Upstream:http://downloads.asterisk.org/pub/security/AST-2018-008.html
More Information

Updated: 2020-04-24 03:47:00 UTC (commit d3f8a6ed481830fb100109a132bef581fc4176fe)