An Asterisk Manager Interface security check bypass was found in the way
Asterisk performed user access check during the originate manager action.
A remote authenticated user, with manager privilege, could use this flaw
to escalate their privileges and execute arbitrary shell commands via an
'Async' header sent together with 'Application' header during the manager
(against v1.4 branch)
(against v1.6.1 branch)
(against v1.6.2 branch)
(against v1.8 branch)
This issue affects the versions of asterisk package, as shipped
with Fedora release of 13 and 14.
This issue affects the version of the asterisk package, as present
within EPEL-6 repository.
Please schedule an update.
Created asterisk tracking bugs for this issue
Affects: fedora-all [bug 698918]
Affects: epel-6 [bug 698919]
The CVE identifier of CVE-2011-1599 has been assigned to this issue:
This is corrected via these builds that have the fixes from upstream: