CVE-2016-9938
Asterisk SIP Header Whitewashing Authentication Bypass
Description
An issue was discovered in Asterisk Open Source 11.x before 11.25.1, 13.x before 13.13.1, and 14.x before 14.2.1 and Certified Asterisk 11.x before 11.6-cert16 and 13.x before 13.8-cert4. The chan_sip channel driver has a liberal definition for whitespace when attempting to strip the content between a SIP header name and a colon character. Rather than following RFC 3261 and stripping only spaces and horizontal tabs, Asterisk treats any non-printable ASCII character as if it were whitespace. This means that headers such as Contact\x01: will be seen as a valid Contact header. This mostly does not pose a problem until Asterisk is placed in tandem with an authenticating SIP proxy. In such a case, a crafty combination of valid and invalid To headers can cause a proxy to allow an INVITE request into Asterisk without authentication since it believes the request is an in-dialog request. However, because of the bug described above, the request will look like an out-of-dialog request to Asterisk. Asterisk will then process the request as a new call. The result is that Asterisk can process calls from unvetted sources without any authentication. If you do not use a proxy for authentication, then this issue does not affect you. If your proxy is dialog-aware (meaning that the proxy keeps track of what dialogs are currently valid), then this issue does not affect you. If you use chan_pjsip instead of chan_sip, then this issue does not affect you.
INFO
Published Date :
Dec. 12, 2016, 9:59 p.m.
Last Modified :
July 27, 2017, 1:29 a.m.
Source :
[email protected]
Remotely Exploitable :
Yes !
Impact Score :
1.4
Exploitability Score :
3.9
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2016-9938
.
URL | Resource |
---|---|
http://downloads.asterisk.org/pub/security/AST-2016-009.html | Mitigation Vendor Advisory |
http://www.securityfocus.com/bid/94789 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1037408 |
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2016-9938
vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2016-9938
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Modified by [email protected]
May. 14, 2024
Action Type Old Value New Value -
CVE Modified by [email protected]
Jul. 27, 2017
Action Type Old Value New Value Added Reference http://www.securitytracker.com/id/1037408 [No Types Assigned] -
Reanalysis by [email protected]
Jan. 03, 2017
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:a:asterisk:open_source:11.0.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.0.0:beta1:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.0.0:beta2:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.0.0:rc1:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.0.0:rc2:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.0.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.0.2:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.1.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.1.0:rc1:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.1.0:rc3:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.1.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.1.2:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.10.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.10.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.10.2:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.11.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.12.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.12.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.13.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.13.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.14.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.14.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.14.2:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.15.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.15.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.16.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.17.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.17.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.18.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.19.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.2.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.2.0:rc1:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.2.0:rc2:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.2.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.2.2:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.20.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.21.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.21.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.21.2:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.22.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.22.0:rc1:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.23.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.23.0:rc1:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.23.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.24.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.24.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.25.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.3.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.4.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.5.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.5.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.6.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.6.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.7.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.8.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.8.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.9.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.0.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.0.0:beta1:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.0.0:beta2:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.0.0:beta3:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.0.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.0.2:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.1.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.1.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.10.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.10.0:rc1:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.11.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.11.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.11.2:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.12.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.12.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.12.2:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.13.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.2.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.2.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.3.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.3.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.3.2:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.4.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.5.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.6.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.7.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.7.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.7.2:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.8.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.8.0:rc1:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.8.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.8.2:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.9.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.9.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:14.0.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:14.0.0:beta1:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:14.0.0:beta2:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:14.0.0:rc1:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:14.0.0:rc2:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:14.0.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:14.0.2:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:14.1.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:14.1.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:14.1.2:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:14.2.0:*:*:*:*:*:*:* OR *cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.0.1:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.0.2:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.1.1:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.1.2:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.10.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.10.1:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.10.2:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.11.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.12.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.12.1:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.13.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.13.1:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.14.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.14.1:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.14.2:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.15.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.15.1:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.16.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.17.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.17.1:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.18.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.19.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.2.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.2.0:rc1:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.2.0:rc2:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.2.1:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.2.2:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.20.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.21.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.21.1:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.21.2:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.22.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.22.0:rc1:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.23.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.23.0:rc1:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.23.1:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.24.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.24.1:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.25.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.3.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.4.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.5.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.5.1:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.6.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.6.1:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.7.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.8.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.8.1:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:11.9.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.0.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.0.0:beta1:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.0.0:beta2:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.0.0:beta3:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.0.1:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.0.2:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.1.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.1.1:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.10.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.10.0:rc1:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.11.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.11.1:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.11.2:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.12.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.12.1:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.12.2:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.13.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.2.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.2.1:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.3.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.3.1:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.3.2:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.4.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.5.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.6.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.7.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.7.1:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.7.2:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.8.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.8.0:rc1:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.8.1:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.8.2:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.9.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:13.9.1:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:14.0.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:14.0.0:beta1:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:14.0.0:beta2:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:14.0.0:rc1:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:14.0.0:rc2:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:14.0.1:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:14.0.2:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:14.1.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:14.1.1:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:14.1.2:*:*:*:*:*:*:* *cpe:2.3:a:digium:asterisk:14.2.0:*:*:*:*:*:*:* Added CPE Configuration OR *cpe:2.3:a:digium:certified_asterisk:11.0.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.0.0:rc1:*:*:*:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.0.0:rc2:*:*:*:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.1.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.1.0:rc1:*:*:*:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.1.0:rc2:*:*:*:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.1.0:rc3:*:*:*:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.2.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.2.0:rc1:*:*:*:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.2.0:rc2:*:*:*:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.3.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.3.0:rc1:*:*:*:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.3.0:rc2:*:*:*:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.4.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.4.0:rc1:*:*:*:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.4.0:rc2:*:*:*:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.4.0:rc3:*:*:*:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.5.0:*:*:*:*:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.5.0:rc1:*:*:*:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.5.0:rc2:*:*:*:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:*:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:lts:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.6:cert10:*:*:lts:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.6:cert11:*:*:lts:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.6:cert12:*:*:lts:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.6:cert13:*:*:lts:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.6:cert14:*:*:lts:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.6:cert15:*:*:lts:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc1:*:*:*:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc2:*:*:*:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:*:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:lts:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:*:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:lts:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.6:cert4:*:*:lts:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.6:cert5:*:*:lts:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.6:cert6:*:*:lts:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.6:cert7:*:*:lts:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.6:cert8:*:*:lts:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.6:cert9:*:*:lts:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.6.0:*:*:*:lts:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.6.0:-:*:*:*:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.6.0:rc1:*:*:*:*:*:* *cpe:2.3:a:digium:certified_asterisk:11.6.0:rc2:*:*:*:*:*:* -
Initial Analysis by [email protected]
Dec. 22, 2016
Action Type Old Value New Value Added CVSS V2 (AV:N/AC:L/Au:N/C:N/I:P/A:N) Added CVSS V3 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Changed Reference Type http://downloads.asterisk.org/pub/security/AST-2016-009.html No Types Assigned http://downloads.asterisk.org/pub/security/AST-2016-009.html Mitigation, Vendor Advisory Changed Reference Type http://www.securityfocus.com/bid/94789 No Types Assigned http://www.securityfocus.com/bid/94789 Third Party Advisory, VDB Entry Added CWE CWE-285 Added CPE Configuration OR *cpe:2.3:a:asterisk:open_source:11.0.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.0.0:beta1:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.0.0:beta2:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.0.0:rc1:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.0.0:rc2:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.0.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.0.2:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.1.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.1.0:rc1:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.1.0:rc3:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.1.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.1.2:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.10.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.10.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.10.2:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.11.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.12.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.12.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.13.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.13.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.14.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.14.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.14.2:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.15.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.15.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.16.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.17.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.17.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.18.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.19.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.2.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.2.0:rc1:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.2.0:rc2:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.2.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.2.2:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.20.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.21.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.21.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.21.2:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.22.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.22.0:rc1:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.23.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.23.0:rc1:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.23.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.24.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.24.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.25.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.3.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.4.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.5.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.5.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.6.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.6.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.7.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.8.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.8.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:11.9.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.0.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.0.0:beta1:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.0.0:beta2:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.0.0:beta3:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.0.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.0.2:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.1.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.1.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.10.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.10.0:rc1:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.11.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.11.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.11.2:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.12.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.12.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.12.2:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.13.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.2.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.2.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.3.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.3.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.3.2:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.4.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.5.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.6.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.7.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.7.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.7.2:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.8.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.8.0:rc1:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.8.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.8.2:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.9.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:13.9.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:14.0.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:14.0.0:beta1:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:14.0.0:beta2:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:14.0.0:rc1:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:14.0.0:rc2:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:14.0.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:14.0.2:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:14.1.0:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:14.1.1:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:14.1.2:*:*:*:*:*:*:* *cpe:2.3:a:asterisk:open_source:14.2.0:*:*:*:*:*:*:* -
CVE Modified by [email protected]
Dec. 16, 2016
Action Type Old Value New Value Added Reference http://www.securityfocus.com/bid/94789 [No Types Assigned]
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2016-9938
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2016-9938
weaknesses.
Exploit Prediction
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.
0.20 }} 0.00%
score
0.55719
percentile