In Asterisk 11.x before 11.25.2, 13.x before 13.17.1, and 14.x before 14.6.1 and Certified Asterisk 11.x before 11.6-cert17 and 13.x before 13.13-cert5, unauthorized command execution is possible. The app_minivm module has an "externnotify" program configuration option that is executed by the MinivmNotify dialplan application. The application uses the caller-id name and number as part of a built string passed to the OS shell for interpretation and execution. Since the caller-id name and number can come from an untrusted source, a crafted caller-id name or number allows an arbitrary shell command injection.
References
Link | Resource |
---|---|
https://issues.asterisk.org/jira/browse/ASTERISK-27103 | Issue Tracking Patch Third Party Advisory |
https://bugs.debian.org/873908 | Issue Tracking Patch Third Party Advisory |
http://downloads.asterisk.org/pub/security/AST-2017-006.html | Vendor Advisory |
http://www.securitytracker.com/id/1039252 | Third Party Advisory VDB Entry |
https://security.gentoo.org/glsa/201710-29 | |
http://www.debian.org/security/2017/dsa-3964 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Information
Published : 2017-09-02 09:29
Updated : 2019-10-02 17:03
NVD link : CVE-2017-14100
Mitre link : CVE-2017-14100
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
digium
- certified_asterisk
- asterisk