5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.111 Low
EPSS
Percentile
95.1%
The Asterisk Development Team reports:
It is possible for a user of the Asterisk Manager Interface to
bypass a security check and execute shell commands when they
should not have that ability. Sending the “Async” header with
the “Application” header during an Originate action, allows
authenticated manager users to execute shell commands. Only
users with the “system” privilege should be able to do this.
On systems that have the Asterisk Manager Interface, Skinny, SIP
over TCP, or the built in HTTP server enabled, it is possible for
an attacker to open as many connections to asterisk as he wishes.
This will cause Asterisk to run out of available file descriptors
and stop processing any new calls. Additionally, disk space can
be exhausted as Asterisk logs failures to open new file
descriptors.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
FreeBSD | any | noarch | asterisk14 | < 1.4.40.1 | UNKNOWN |
FreeBSD | any | noarch | asterisk16 | < 1.6.2.17.3 | UNKNOWN |
FreeBSD | any | noarch | asterisk18 | < 1.8.3.3 | UNKNOWN |