RULE(RULE ID:713896)

Rule General Information
Release Date: 2020-03-25
Rule Name: Sangoma Asterisk manager.c OS Command Injection Vulnerability (CVE-2019-18610)
Severity:
CVE ID:
Rule Protection Details
Description: An issue was discovered in manager.c in Sangoma Asterisk through 13.x, 16.x, 17.x and Certified Asterisk 13.21 through 13.21-cert4. A remote authenticated Asterisk Manager Interface (AMI) user without system authorization could use a specially crafted Originate AMI request to execute arbitrary system commands.
Impact: An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software.
Affected OS: Linux
Reference: http://downloads.asterisk.org/pub/security/AST-2019-007.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00038.html
https://www.asterisk.org/downloads/security-advisories
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
https://downloads.asterisk.org/pub/security/AST-2019-007.html