Bug 1109278 (CVE-2014-4046)

Summary: CVE-2014-4046 asterisk: Manager User Unauthorized Shell Access (AST-2014-006)
Product: [Other] Security Response Reporter: Vasyl Kaigorodov <vkaigoro>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED UPSTREAM QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: itamar, jeff, lmadsen, rbryant
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: asterisk 11.10.1 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 02:33:35 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1109280    
Bug Blocks:    

Description Vasyl Kaigorodov 2014-06-13 14:44:56 UTC
Manager users can execute arbitrary shell commands with the
MixMonitor manager action. Asterisk does not require system
class authorization for a manager user to use the
MixMonitor action, so any manager user who is permitted to
use manager commands can potentially execute shell commands
as the user executing the Asterisk process.

Upstream patch:
http://downloads.asterisk.org/pub/security/AST-2014-006-11.diff

External references:

https://issues.asterisk.org/jira/browse/ASTERISK-23609
http://downloads.digium.com/pub/security/AST-2014-006.html

Comment 1 Vasyl Kaigorodov 2014-06-13 14:45:19 UTC
Created asterisk tracking bugs for this issue:

Affects: fedora-all [bug 1109280]

Comment 2 Product Security DevOps Team 2019-06-08 02:33:35 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.