CVE-2012-2186
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
31/08/2012
Last modified:
11/04/2025
Description
Incomplete blacklist vulnerability in main/manager.c in Asterisk Open Source 1.8.x before 1.8.15.1 and 10.x before 10.7.1, Certified Asterisk 1.8.11 before 1.8.11-cert6, Asterisk Digiumphones 10.x.x-digiumphones before 10.7.1-digiumphones, and Asterisk Business Edition C.3.x before C.3.7.6 allows remote authenticated users to execute arbitrary commands by leveraging originate privileges and providing an ExternalIVR value in an AMI Originate action.
Impact
Base Score 2.0
9.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:asterisk:open_source:1.8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:asterisk:open_source:1.8.0:beta1:*:*:*:*:*:* | ||
| cpe:2.3:a:asterisk:open_source:1.8.0:beta2:*:*:*:*:*:* | ||
| cpe:2.3:a:asterisk:open_source:1.8.0:beta3:*:*:*:*:*:* | ||
| cpe:2.3:a:asterisk:open_source:1.8.0:beta4:*:*:*:*:*:* | ||
| cpe:2.3:a:asterisk:open_source:1.8.0:beta5:*:*:*:*:*:* | ||
| cpe:2.3:a:asterisk:open_source:1.8.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:asterisk:open_source:1.8.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:a:asterisk:open_source:1.8.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:a:asterisk:open_source:1.8.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:a:asterisk:open_source:1.8.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:a:asterisk:open_source:1.8.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:asterisk:open_source:1.8.1:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:asterisk:open_source:1.8.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:asterisk:open_source:1.8.1.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://downloads.asterisk.org/pub/security/AST-2012-012.html
- http://secunia.com/advisories/50687
- http://secunia.com/advisories/50756
- http://www.debian.org/security/2012/dsa-2550
- http://www.securitytracker.com/id?1027460=
- http://downloads.asterisk.org/pub/security/AST-2012-012.html
- http://secunia.com/advisories/50687
- http://secunia.com/advisories/50756
- http://www.debian.org/security/2012/dsa-2550
- http://www.securitytracker.com/id?1027460=



