7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.961 High
EPSS
Percentile
99.5%
In Asterisk 11.x before 11.25.2, 13.x before 13.17.1, and 14.x before
14.6.1 and Certified Asterisk 11.x before 11.6-cert17 and 13.x before
13.13-cert5, unauthorized command execution is possible. The app_minivm
module has an “externnotify” program configuration option that is executed
by the MinivmNotify dialplan application. The application uses the
caller-id name and number as part of a built string passed to the OS shell
for interpretation and execution. Since the caller-id name and number can
come from an untrusted source, a crafted caller-id name or number allows an
arbitrary shell command injection.
downloads.asterisk.org/pub/security/AST-2017-006.html
www.securitytracker.com/id/1039252
bugs.debian.org/873908
issues.asterisk.org/jira/browse/ASTERISK-27103
launchpad.net/bugs/cve/CVE-2017-14100
nvd.nist.gov/vuln/detail/CVE-2017-14100
security-tracker.debian.org/tracker/CVE-2017-14100
www.cve.org/CVERecord?id=CVE-2017-14100
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.961 High
EPSS
Percentile
99.5%