ID CVE-2014-4046
Summary Asterisk Open Source 11.x before 11.10.1 and 12.x before 12.3.1 and Certified Asterisk 11.6 before 11.6-cert3 allows remote authenticated Manager users to execute arbitrary shell commands via a MixMonitor action. Per: http://cwe.mitre.org/data/definitions/77.html "CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')"
References
Vulnerable Configurations
  • cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.2.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.2.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.2.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.2.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.3.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.3.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.3.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.3.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.4.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.4.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.4.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.4.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.4.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.4.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.5.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.5.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.5.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.5.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.8.0:-:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.8.0:-:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.8.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.8.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.8.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.8.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.8.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.8.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.9.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.9.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.9.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.9.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.9.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.10.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.10.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:11.10.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:11.10.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:12.1.0:-:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:12.1.0:-:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:12.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:12.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:12.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:12.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:12.2.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:12.2.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:12.2.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:12.2.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:12.2.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:12.2.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:12.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:12.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:12.3.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:12.3.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:12.3.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:12.3.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:*:*:*:*
    cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:*:*:*:*
  • cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc2:*:*:*:*:*:*
    cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc2:*:*:*:*:*:*
  • cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:*:*:*:*
    cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:*:*:*:*
  • cpe:2.3:a:digium:certified_asterisk:11.6.0:-:*:*:*:*:*:*
    cpe:2.3:a:digium:certified_asterisk:11.6.0:-:*:*:*:*:*:*
  • cpe:2.3:a:digium:certified_asterisk:11.6.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:certified_asterisk:11.6.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:certified_asterisk:11.6.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:digium:certified_asterisk:11.6.0:rc2:*:*:*:*:*:*
CVSS
Base: 6.5 (as of 09-10-2018 - 19:47)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:S/C:P/I:P/A:P
refmap via4
bugtraq 20140612 AST-2014-006: Asterisk Manager User Unauthorized Shell Access
confirm http://downloads.asterisk.org/pub/security/AST-2014-006.html
misc http://packetstormsecurity.com/files/127088/Asterisk-Project-Security-Advisory-AST-2014-006.html
Last major update 09-10-2018 - 19:47
Published 17-06-2014 - 14:55
Last modified 09-10-2018 - 19:47
Back to Top