asterisk:stretch is vulnerable to Access Restriction Bypass. An issue was discovered in manager.c in Sangoma Asterisk through 13.x, 16.x, 17.x and Certified Asterisk 13.21 through 13.21-cert4. A remote authenticated Asterisk Manager Interface (AMI) user without system authorization could use a specially crafted Originate AMI request to execute arbitrary system commands.
CPE | Name | Operator | Version |
---|---|---|---|
asterisk:stretch | eq | 1:13.14.1~dfsg-2+deb9u4 | |
asterisk:stretch | eq | 1:13.14.1~dfsg-2+deb9u4 |