CVE-2011-1599

Source
https://nvd.nist.gov/vuln/detail/CVE-2011-1599
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2011-1599.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2011-1599
Related
Published
2011-04-27T00:55:04Z
Modified
2025-04-11T00:51:21Z
Summary
[none]
Details

manager.c in the Manager Interface in Asterisk Open Source 1.4.x before 1.4.40.1, 1.6.1.x before 1.6.1.25, 1.6.2.x before 1.6.2.17.3, and 1.8.x before 1.8.3.3 and Asterisk Business Edition C.x.x before C.3.6.4 does not properly check for the system privilege, which allows remote authenticated users to execute arbitrary commands via an Originate action that has an Async header in conjunction with an Application header.

References

Affected packages

Debian:11 / asterisk

Package

Name
asterisk
Purl
pkg:deb/debian/asterisk?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:1.8.3.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}