Description
Incomplete blacklist vulnerability in main/manager.c in Asterisk Open Source 1.8.x before 1.8.15.1 and 10.x before 10.7.1, Certified Asterisk 1.8.11 before 1.8.11-cert6, Asterisk Digiumphones 10.x.x-digiumphones before 10.7.1-digiumphones, and Asterisk Business Edition C.3.x before C.3.7.6 allows remote authenticated users to execute arbitrary commands by leveraging originate privileges and providing an ExternalIVR value in an AMI Originate action.
Published: 2012-08-31
Score: 9.0 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-2550-1 asterisk security update
Debian DSA Debian DSA DSA-2550-2 asterisk regression update
EUVD EUVD EUVD-2012-2180 Incomplete blacklist vulnerability in main/manager.c in Asterisk Open Source 1.8.x before 1.8.15.1 and 10.x before 10.7.1, Certified Asterisk 1.8.11 before 1.8.11-cert6, Asterisk Digiumphones 10.x.x-digiumphones before 10.7.1-digiumphones, and Asterisk Business Edition C.3.x before C.3.7.6 allows remote authenticated users to execute arbitrary commands by leveraging originate privileges and providing an ExternalIVR value in an AMI Originate action.
History

Thu, 15 Aug 2024 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Sangoma
Sangoma asterisk
CPEs cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*
Vendors & Products Sangoma
Sangoma asterisk

Subscriptions

Asterisk Business Edition Certified Asterisk Digiumphones Open Source
Sangoma Asterisk
cve-icon MITRE

Status: PUBLISHED

Assigner: ibm

Published:

Updated: 2024-08-06T19:26:08.975Z

Reserved: 2012-04-04T00:00:00.000Z

Link: CVE-2012-2186

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2012-08-31T14:55:00.950

Modified: 2025-04-11T00:51:21.963

Link: CVE-2012-2186

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses