vulnerability
Ubuntu: (CVE-2017-14100): asterisk vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | Sep 2, 2017 | Jun 26, 2025 | Jul 28, 2025 |
Description
In Asterisk 11.x before 11.25.2, 13.x before 13.17.1, and 14.x before 14.6.1 and Certified Asterisk 11.x before 11.6-cert17 and 13.x before 13.13-cert5, unauthorized command execution is possible. The app_minivm module has an "externnotify" program configuration option that is executed by the MinivmNotify dialplan application. The application uses the caller-id name and number as part of a built string passed to the OS shell for interpretation and execution. Since the caller-id name and number can come from an untrusted source, a crafted caller-id name or number allows an arbitrary shell command injection.
Solution
References
- CVE-2017-14100
- https://attackerkb.com/topics/CVE-2017-14100
- URL-http://downloads.asterisk.org/pub/security/AST-2017-006.html
- URL-http://www.securitytracker.com/id/1039252
- URL-https://bugs.debian.org/873908
- URL-https://issues.asterisk.org/jira/browse/ASTERISK-27103
- URL-https://www.cve.org/CVERecord?id=CVE-2017-14100
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.