In Asterisk 11.x before 11.25.2, 13.x before 13.17.1, and 14.x before
14.6.1 and Certified Asterisk 11.x before 11.6-cert17 and 13.x before
13.13-cert5, unauthorized command execution is possible. The app_minivm
module has an "externnotify" program configuration option that is executed
by the MinivmNotify dialplan application. The application uses the
caller-id name and number as part of a built string passed to the OS shell
for interpretation and execution. Since the caller-id name and number can
come from an untrusted source, a crafted caller-id name or number allows an
arbitrary shell command injection.
Upstream:released (1:13.17.1~dfsg-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needed)
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (1:13.17.1~dfsg-1ubuntu1)
Ubuntu 19.10 (Eoan Ermine):not-affected (1:13.17.1~dfsg-1ubuntu1)
Ubuntu 20.04 (Focal Fossa):not-affected (1:13.17.1~dfsg-1ubuntu1)
More Information

Updated: 2020-04-24 03:37:28 UTC (commit d3f8a6ed481830fb100109a132bef581fc4176fe)