Vulnerability Details : CVE-2010-0685
The design of the dialplan functionality in Asterisk Open Source 1.2.x, 1.4.x, and 1.6.x; and Asterisk Business Edition B.x.x and C.x.x, when using the ${EXTEN} channel variable and wildcard pattern matches, allows context-dependent attackers to inject strings into the dialplan using metacharacters that are injected when the variable is expanded, as demonstrated using the Dial application to process a crafted SIP INVITE message that adds an unintended outgoing channel leg. NOTE: it could be argued that this is not a vulnerability in Asterisk, but a class of vulnerabilities that can occur in any program that uses this feature without the associated filtering functionality that is already available.
Threat overview for CVE-2010-0685
Top countries where our scanners detected CVE-2010-0685
Top open port discovered on systems with this issue
80
IPs affected by CVE-2010-0685 19
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2010-0685!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2010-0685
Probability of exploitation activity in the next 30 days: 0.65%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 77 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-0685
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST |
References for CVE-2010-0685
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/56397
Asterisk Dial() weak security CVE-2010-0685 Vulnerability Report
-
http://downloads.digium.com/pub/security/AST-2010-002.html
AST-2010-002Exploit;Vendor Advisory
-
http://svn.asterisk.org/svn/asterisk/branches/1.2/README-SERIOUSLY.bestpractices.txt
-
http://www.securityfocus.com/archive/1/509608/100/0/threaded
SecurityFocus
-
http://www.vupen.com/english/advisories/2010/0439
Webmail | OVH- OVHVendor Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037679.html
[SECURITY] Fedora 11 Update: asterisk-1.6.1.17-1.fc11
-
http://www.securitytracker.com/id?1023637
Asterisk Scripting Support Lets Remote Users Inject Data into Dialplans - SecurityTracker
Products affected by CVE-2010-0685
- cpe:2.3:a:digium:asterisk:1.2.13:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.11:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.12:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.14:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.15:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.21.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.22:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.7:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.8:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.20:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.21:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:c.2.3:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.22:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.23:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.12:netsec:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.12.1:netsec:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.16:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.17:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.2:netsec:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.20:netsec:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.22:netsec:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.23:netsec:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.23:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.26.1:netsec:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.26.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.3:netsec:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.31.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.32:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.33:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.10:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.15:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.16:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.25:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.10:netsec:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.11:netsec:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.18:netsec:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.19:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.21:netsec:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.21.1:netsec:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.25:netsec:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.25:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.27:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.28:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.30.2:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.30.3:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.12:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.17:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.18:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.20:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.24:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.15:netsec:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.16:netsec:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.19:netsec:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.26:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.26:netsec:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.28.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.29:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.30.4:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.31:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.13:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.14:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.19:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.13:netsec:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.17:netsec:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.18:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.24:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.24:netsec:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.26.2:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.26.2:netsec:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.30:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.30.1:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.34:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.11:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.21:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.26:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.9:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:b.2.2.1:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:b.2.3.1:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:b.2.5.1:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:b.2.5.2:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:b.1.3.2:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:b.2.3.4:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:b.2.3.5:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:c.3.0:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:b.1.3.3:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:b.2.2.0:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:b.2.3.6:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:b.2.5.0:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:b.2.3.2:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:b.2.3.3:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:b.2.5.3:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.4.27:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.35:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:1.2.36:*:*:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:c.1.8.0:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:c.1.8.1:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:c.1.6.2:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:c.1.6:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:c.1.6.1:-:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:c.1.0:beta7:business:*:*:*:*:*
- cpe:2.3:a:digium:asterisk:c.1.0:beta8:business:*:*:*:*:*