|
|||
Rule General Information |
---|
Release Date: | 2019-06-20 | |
Rule Name: | Digium Asterisk userinfo Command Execution Vulnerability (CVE-2017-14100) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | In Asterisk 11.x before 11.25.2, 13.x before 13.17.1, and 14.x before 14.6.1 and Certified Asterisk 11.x before 11.6-cert17 and 13.x before 13.13-cert5, unauthorized command execution is possible. The app_minivm module has an "externnotify" program configuration option that is executed by the MinivmNotify dialplan application. The application uses the caller-id name and number as part of a built string passed to the OS shell for interpretation and execution. Since the caller-id name and number can come from an untrusted source, a crafted caller-id name or number allows an arbitrary shell command injection. | |
Impact: | An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others | |
Reference: | SecurityTrackerID:1039252 http://downloads.asterisk.org/pub/security/AST-2017-006.html http://www.debian.org/security/2017/dsa-3964 https://bugs.debian.org/873908 |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: https://issues.asterisk.org/jira/browse/ASTERISK-27103 |