Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2012-2186

Опубликовано: 31 авг. 2012
Источник: nvd
CVSS2: 9
EPSS Низкий

Описание

Incomplete blacklist vulnerability in main/manager.c in Asterisk Open Source 1.8.x before 1.8.15.1 and 10.x before 10.7.1, Certified Asterisk 1.8.11 before 1.8.11-cert6, Asterisk Digiumphones 10.x.x-digiumphones before 10.7.1-digiumphones, and Asterisk Business Edition C.3.x before C.3.7.6 allows remote authenticated users to execute arbitrary commands by leveraging originate privileges and providing an ExternalIVR value in an AMI Originate action.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:asterisk:open_source:1.8.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.0:beta1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.0:beta2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.0:beta3:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.0:beta4:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.0:beta5:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.0:rc3:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.0:rc4:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.0:rc5:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.1:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.1.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.1.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.2:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.2.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.2.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.2.3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.2.4:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.3:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.3:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.3:rc3:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.3.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.3.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.3.3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.4:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.4:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.4:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.4:rc3:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.4.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.4.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.4.3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.4.4:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.5:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.5.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.6.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.6.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.6.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.6.0:rc3:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.7:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.7.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.7.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.7.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.7.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.7.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.8.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.8.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.8.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.8.0:rc3:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.8.0:rc4:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.8.0:rc5:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.8.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.8.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.9.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.9.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.9.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.9.0:rc3:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.9.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.9.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.9.3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.10.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.10.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.10.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.10.0:rc3:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.10.0:rc4:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.10.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.11.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.11.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.11.0:rc3:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.11.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.12:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.12.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.12.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.12.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:1.8.12.0:rc3:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*
Версия до 1.8.15.0 (включая)
Конфигурация 2

Одно из

cpe:2.3:a:asterisk:open_source:10.0.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.0.0:rc3:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.0.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.1.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.1.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.1.2:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.1.3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.2.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.2.0:rc3:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.2.0:rc4:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.2.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.3:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.3.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.3.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.3.0:rc3:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.3.1:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.4.0:*:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.4.0:rc1:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.4.0:rc2:*:*:*:*:*:*
cpe:2.3:a:asterisk:open_source:10.4.0:rc3:*:*:*:*:*:*
cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*
Версия до 10.7.0 (включая)
Конфигурация 3

Одно из

cpe:2.3:a:asterisk:certified_asterisk:*:cert5:*:*:*:*:*:*
Версия до 1.8.11 (включая)
cpe:2.3:a:asterisk:certified_asterisk:1.8.11:cert:*:*:*:*:*:*
cpe:2.3:a:asterisk:certified_asterisk:1.8.11:cert1:*:*:*:*:*:*
cpe:2.3:a:asterisk:certified_asterisk:1.8.11:cert2:*:*:*:*:*:*
cpe:2.3:a:asterisk:certified_asterisk:1.8.11:cert3:*:*:*:*:*:*
cpe:2.3:a:asterisk:certified_asterisk:1.8.11:cert4:*:*:*:*:*:*
Конфигурация 4
cpe:2.3:a:asterisk:digiumphones:*:*:*:*:*:*:*:*
Версия до 10.7.0 (включая)
Конфигурация 5

Одно из

cpe:2.3:a:asterisk:business_edition:*:*:*:*:*:*:*:*
Версия до c.3.7.5 (включая)
cpe:2.3:a:asterisk:business_edition:c.3.0:*:*:*:*:*:*:*

EPSS

Процентиль: 64%
0.00465
Низкий

9 Critical

CVSS2

Дефекты

NVD-CWE-Other

Связанные уязвимости

ubuntu
больше 13 лет назад

Incomplete blacklist vulnerability in main/manager.c in Asterisk Open Source 1.8.x before 1.8.15.1 and 10.x before 10.7.1, Certified Asterisk 1.8.11 before 1.8.11-cert6, Asterisk Digiumphones 10.x.x-digiumphones before 10.7.1-digiumphones, and Asterisk Business Edition C.3.x before C.3.7.6 allows remote authenticated users to execute arbitrary commands by leveraging originate privileges and providing an ExternalIVR value in an AMI Originate action.

debian
больше 13 лет назад

Incomplete blacklist vulnerability in main/manager.c in Asterisk Open ...

github
больше 3 лет назад

Incomplete blacklist vulnerability in main/manager.c in Asterisk Open Source 1.8.x before 1.8.15.1 and 10.x before 10.7.1, Certified Asterisk 1.8.11 before 1.8.11-cert6, Asterisk Digiumphones 10.x.x-digiumphones before 10.7.1-digiumphones, and Asterisk Business Edition C.3.x before C.3.7.6 allows remote authenticated users to execute arbitrary commands by leveraging originate privileges and providing an ExternalIVR value in an AMI Originate action.

EPSS

Процентиль: 64%
0.00465
Низкий

9 Critical

CVSS2

Дефекты

NVD-CWE-Other