{ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-14100", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Asterisk 11.x before 11.25.2, 13.x before 13.17.1, and 14.x before 14.6.1 and Certified Asterisk 11.x before 11.6-cert17 and 13.x before 13.13-cert5, unauthorized command execution is possible. The app_minivm module has an \"externnotify\" program configuration option that is executed by the MinivmNotify dialplan application. The application uses the caller-id name and number as part of a built string passed to the OS shell for interpretation and execution. Since the caller-id name and number can come from an untrusted source, a crafted caller-id name or number allows an arbitrary shell command injection." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://issues.asterisk.org/jira/browse/ASTERISK-27103", "refsource": "CONFIRM", "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27103" }, { "name": "1039252", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039252" }, { "name": "https://bugs.debian.org/873908", "refsource": "CONFIRM", "url": "https://bugs.debian.org/873908" }, { "name": "GLSA-201710-29", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201710-29" }, { "name": "DSA-3964", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3964" }, { "name": "http://downloads.asterisk.org/pub/security/AST-2017-006.html", "refsource": "CONFIRM", "url": "http://downloads.asterisk.org/pub/security/AST-2017-006.html" } ] } }