Asterisk Open Source 11.x before 11.10.1 and 12.x before 12.3.1 and Certified Asterisk 11.6 before 11.6-cert3 allows remote authenticated Manager users to execute arbitrary shell commands via a MixMonitor action.
http://downloads.asterisk.org/pub/security/AST-2014-006.html
http://packetstormsecurity.com/files/127088/Asterisk-Project-Security-Advisory-AST-2014-006.html
http://www.securityfocus.com/archive/1/532419/100/0/threaded
Source: MITRE
Published: 2014-06-17
Updated: 2018-10-09
Type: NVD-CWE-Other
Base Score: 6.5
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P
Impact Score: 6.4
Exploitability Score: 8
Severity: MEDIUM
OR
cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.0.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.0.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.1.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.1.2:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.3.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.3.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.4.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.4.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.4.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.4.0:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.5.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.5.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.5.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.8.0:-:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.8.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.8.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.8.0:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.8.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.9.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.9.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:11.9.0:rc2:*:*:*:*:*:*
OR
cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:12.1.0:-:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:12.1.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:12.2.0:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:12.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:12.2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:12.2.0:rc3:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:12.3.0:*:*:*:*:*:*:*
OR
cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc1:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc2:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:11.6.0:-:*:*:*:*:*:*
ID | Name | Product | Family | Severity |
---|---|---|---|---|
90873 | Debian DLA-455-1 : asterisk security update | Nessus | Debian Local Security Checks | high |
76482 | Mandriva Linux Security Advisory : asterisk (MDVSA-2014:138) | Nessus | Mandriva Local Security Checks | medium |
76227 | GLSA-201406-25 : Asterisk: Multiple vulnerabilities | Nessus | Gentoo Local Security Checks | medium |
76103 | FreeBSD : asterisk -- multiple vulnerabilities (f109b02f-f5a4-11e3-82e9-00a098b18457) | Nessus | FreeBSD Local Security Checks | medium |
76087 | Asterisk Manager Interface MixMonitor Privilege Escalation (AST-2014-006) | Nessus | Misc. | medium |