Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-18610

Опубликовано: 22 нояб. 2019
Источник: debian
EPSS Средний

Описание

An issue was discovered in manager.c in Sangoma Asterisk through 13.x, 16.x, 17.x and Certified Asterisk 13.21 through 13.21-cert4. A remote authenticated Asterisk Manager Interface (AMI) user without system authorization could use a specially crafted Originate AMI request to execute arbitrary system commands.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
asteriskfixed1:16.10.0~dfsg-1package
asteriskfixed1:16.2.1~dfsg-1+deb10u2busterpackage

Примечания

  • https://downloads.asterisk.org/pub/security/AST-2019-007.html

  • https://issues.asterisk.org/jira/browse/ASTERISK-28580

EPSS

Процентиль: 97%
0.43014
Средний

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 6 лет назад

An issue was discovered in manager.c in Sangoma Asterisk through 13.x, 16.x, 17.x and Certified Asterisk 13.21 through 13.21-cert4. A remote authenticated Asterisk Manager Interface (AMI) user without system authorization could use a specially crafted Originate AMI request to execute arbitrary system commands.

CVSS3: 8.8
nvd
около 6 лет назад

An issue was discovered in manager.c in Sangoma Asterisk through 13.x, 16.x, 17.x and Certified Asterisk 13.21 through 13.21-cert4. A remote authenticated Asterisk Manager Interface (AMI) user without system authorization could use a specially crafted Originate AMI request to execute arbitrary system commands.

CVSS3: 8.8
github
больше 3 лет назад

An issue was discovered in manager.c in Sangoma Asterisk through 13.x, 16.x, 17.x and Certified Asterisk 13.21 through 13.21-cert4. A remote authenticated Asterisk Manager Interface (AMI) user without system authorization could use a specially crafted Originate AMI request to execute arbitrary system commands.

EPSS

Процентиль: 97%
0.43014
Средний