In Asterisk 11.x before 11.25.2, 13.x before 13.17.1, and 14.x before 14.6.1 and Certified Asterisk 11.x before 11.6-cert17 and 13.x before 13.13-cert5, unauthorized command execution is possible. The app_minivm module has an "externnotify" program configuration option that is executed by the MinivmNotify dialplan application. The application uses the caller-id name and number as part of a built string passed to the OS shell for interpretation and execution. Since the caller-id name and number can come from an untrusted source, a crafted caller-id name or number allows an arbitrary shell command injection.
References
Link | Resource |
---|---|
http://downloads.asterisk.org/pub/security/AST-2017-006.html | Vendor Advisory |
http://www.debian.org/security/2017/dsa-3964 | |
http://www.securitytracker.com/id/1039252 | Third Party Advisory VDB Entry |
https://bugs.debian.org/873908 | Issue Tracking Patch Third Party Advisory |
https://issues.asterisk.org/jira/browse/ASTERISK-27103 | Issue Tracking Patch Third Party Advisory |
https://security.gentoo.org/glsa/201710-29 | |
http://downloads.asterisk.org/pub/security/AST-2017-006.html | Vendor Advisory |
http://www.debian.org/security/2017/dsa-3964 | |
http://www.securitytracker.com/id/1039252 | Third Party Advisory VDB Entry |
https://bugs.debian.org/873908 | Issue Tracking Patch Third Party Advisory |
https://issues.asterisk.org/jira/browse/ASTERISK-27103 | Issue Tracking Patch Third Party Advisory |
https://security.gentoo.org/glsa/201710-29 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 03:12
Type | Values Removed | Values Added |
---|---|---|
References | () http://downloads.asterisk.org/pub/security/AST-2017-006.html - Vendor Advisory | |
References | () http://www.debian.org/security/2017/dsa-3964 - | |
References | () http://www.securitytracker.com/id/1039252 - Third Party Advisory, VDB Entry | |
References | () https://bugs.debian.org/873908 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://issues.asterisk.org/jira/browse/ASTERISK-27103 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201710-29 - |
Information
Published : 2017-09-02 16:29
Updated : 2024-11-21 03:12
NVD link : CVE-2017-14100
Mitre link : CVE-2017-14100
CVE.ORG link : CVE-2017-14100
JSON object : View
Products Affected
digium
- asterisk
- certified_asterisk
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')