Bug 698917 (CVE-2011-1599) - CVE-2011-1599 Asterisk: Shell command execution via manager Originate action (AST-2011-006)
Summary: CVE-2011-1599 Asterisk: Shell command execution via manager Originate action ...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2011-1599
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 698918 698919
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-04-22 09:35 UTC by Jan Lieskovsky
Modified: 2019-09-29 12:44 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2011-05-16 21:25:58 UTC
Embargoed:


Attachments (Terms of Use)

Description Jan Lieskovsky 2011-04-22 09:35:53 UTC
An Asterisk Manager Interface security check bypass was found in the way
Asterisk performed user access check during the originate manager action.
A remote authenticated user, with manager privilege, could use this flaw
to escalate their privileges and execute arbitrary shell commands via an
'Async' header sent together with 'Application' header during the manager
Originate action.

References:
[1] http://downloads.asterisk.org/pub/security/AST-2011-006.html

Upstream patches:
[2] http://downloads.asterisk.org/pub/security/AST-2011-006-1.4.diff 
    (against v1.4 branch)
[3] http://downloads.asterisk.org/pub/security/AST-2011-006-1.6.1.diff
    (against v1.6.1 branch)
[4] http://downloads.asterisk.org/pub/security/AST-2011-006-1.6.2.diff
    (against v1.6.2 branch)
[5] http://downloads.asterisk.org/pub/security/AST-2011-006-1.8.diff
    (against v1.8 branch)

Comment 1 Jan Lieskovsky 2011-04-22 09:37:29 UTC
This issue affects the versions of asterisk package, as shipped
with Fedora release of 13 and 14.

This issue affects the version of the asterisk package, as present
within EPEL-6 repository.

Please schedule an update.

Comment 2 Jan Lieskovsky 2011-04-22 09:40:00 UTC
Created asterisk tracking bugs for this issue

Affects: fedora-all [bug 698918]
Affects: epel-6 [bug 698919]

Comment 3 Jan Lieskovsky 2011-04-22 09:46:44 UTC
CVE Request:
[6] http://www.openwall.com/lists/oss-security/2011/04/21/5

Comment 4 Jan Lieskovsky 2011-04-22 12:57:04 UTC
The CVE identifier of CVE-2011-1599 has been assigned to this issue:
[7] http://www.openwall.com/lists/oss-security/2011/04/22/6

Comment 5 Vincent Danen 2011-05-16 21:25:58 UTC
This is corrected via these builds that have the fixes from upstream:

Fedora-13: asterisk-1.6.2.18-1.fc13
Fedora-14: asterisk-1.6.2.18-1.fc14
Fedora-15: asterisk-1.8.3.3-1.fc15
Fedora-Rawhide: asterisk-1.8.3.3-1.fc16
EPEL-6: asterisk-1.8.3.3-1.el6


Note You need to log in before you can comment on or make changes to this bug.