In Asterisk 11.x before 11.25.2, 13.x before 13.17.1, and 14.x before 14.6.1 and Certified Asterisk 11.x before 11.6-cert17 and 13.x before 13.13-cert5, unauthorized command execution is possible. The app_minivm module has an "externnotify" program configuration option that is executed by the MinivmNotify dialplan application. The application uses the caller-id name and number as part of a built string passed to the OS shell for interpretation and execution. Since the caller-id name and number can come from an untrusted source, a crafted caller-id name or number allows an arbitrary shell command injection.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
https://issues.asterisk.org/jira/browse/ASTERISK-27103 | patch third party advisory issue tracking |
http://www.securitytracker.com/id/1039252 | third party advisory vdb entry |
https://bugs.debian.org/873908 | patch third party advisory issue tracking |
https://security.gentoo.org/glsa/201710-29 | vendor advisory |
http://www.debian.org/security/2017/dsa-3964 | vendor advisory |
http://downloads.asterisk.org/pub/security/AST-2017-006.html | vendor advisory |