Digium.Asterisk.app.minivm.Caller.ID.Command.Execution

description-logoDescription

This indicates an attack attempt against a Code Execution vulnerability in Digium Asterisk.
The vulnerability is due to an error when the vulnerable software handles a maliciously crafted SIP request. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application, via a crafted SIP request.

affected-products-logoAffected Products

Digium Asterisk Open Source prior to 13.17.1
Digium Asterisk Open Source prior to 14.6.1
Digium Asterisk Open Source prior to 11.25.2
Digium Certified Asterisk prior to 11.6-cert17
Digium Certified Asterisk prior to 13.13-cert5

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Upgrade to the latest version available from the website.
https://downloads.asterisk.org/pub/security/AST-2017-006.html

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2019-10-24 14.710 Sig Added
2019-06-13 14.632 Severity:medium:critical