CVE-2014-4046CVE-2014-4046

Affected configuration(s):

cpe:/a:digium:asterisk:11.0.0
cpe:/a:digium:asterisk:11.0.0:beta1
cpe:/a:digium:asterisk:11.0.0:beta2
cpe:/a:digium:asterisk:11.0.0:rc1
cpe:/a:digium:asterisk:11.0.0:rc2
cpe:/a:digium:asterisk:11.0.1
cpe:/a:digium:asterisk:11.0.2
cpe:/a:digium:asterisk:11.1.0
cpe:/a:digium:asterisk:11.1.0:rc1
cpe:/a:digium:asterisk:11.1.0:rc3
cpe:/a:digium:asterisk:11.1.1
cpe:/a:digium:asterisk:11.1.2
cpe:/a:digium:asterisk:11.2.0:rc1
cpe:/a:digium:asterisk:11.2.0:rc2
cpe:/a:digium:asterisk:11.3.0:rc1
cpe:/a:digium:asterisk:11.3.0:rc2
cpe:/a:digium:asterisk:11.4.0
cpe:/a:digium:asterisk:11.4.0:rc1
cpe:/a:digium:asterisk:11.4.0:rc2
cpe:/a:digium:asterisk:11.4.0:rc3
cpe:/a:digium:asterisk:11.5.0
cpe:/a:digium:asterisk:11.5.0:rc1
cpe:/a:digium:asterisk:11.5.0:rc2
cpe:/a:digium:asterisk:11.5.1
cpe:/a:digium:asterisk:11.8.0:-
cpe:/a:digium:asterisk:11.8.0:rc1
cpe:/a:digium:asterisk:11.8.0:rc2
cpe:/a:digium:asterisk:11.8.0:rc3
cpe:/a:digium:asterisk:11.8.1
cpe:/a:digium:asterisk:11.9.0
cpe:/a:digium:asterisk:11.9.0:rc1
cpe:/a:digium:asterisk:11.9.0:rc2
cpe:/a:digium:asterisk:11.10.0
cpe:/a:digium:asterisk:11.10.0:rc1
cpe:/a:digium:asterisk:12.0.0
cpe:/a:digium:asterisk:12.1.0:-
cpe:/a:digium:asterisk:12.1.0:rc1
cpe:/a:digium:asterisk:12.1.0:rc2
cpe:/a:digium:asterisk:12.1.0:rc3
cpe:/a:digium:asterisk:12.1.1
cpe:/a:digium:asterisk:12.2.0
cpe:/a:digium:asterisk:12.2.0:rc1
cpe:/a:digium:asterisk:12.2.0:rc2
cpe:/a:digium:asterisk:12.2.0:rc3
cpe:/a:digium:asterisk:12.3.0
cpe:/a:digium:asterisk:12.3.0:rc1
cpe:/a:digium:asterisk:12.3.0:rc2
cpe:/a:digium:certified_asterisk:11.6:cert1
cpe:/a:digium:certified_asterisk:11.6:cert1_rc1
cpe:/a:digium:certified_asterisk:11.6:cert1_rc2
cpe:/a:digium:certified_asterisk:11.6:cert2
cpe:/a:digium:certified_asterisk:11.6.0:-
cpe:/a:digium:certified_asterisk:11.6.0:rc1
cpe:/a:digium:certified_asterisk:11.6.0:rc2

Date published: 2014-06-17T10:55:07.893-04:00

Date last modified: 2014-06-18T10:39:18.660-04:00

CVSS Score: 6.5

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://downloads.asterisk.org/pub/security/AST-2014-006.html

Summary: Asterisk Open Source 11.x before 11.10.1 and 12.x before 12.3.1 and Certified Asterisk 11.6 before 11.6-cert3 allows remote authenticated Manager users to execute arbitrary shell commands via a MixMonitor action.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *