CVE-2012-4737 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4737): channels/chan_iax2.c in Asterisk Open Source 1.8.x before 1.8.15.1 and 10.x before 10.7.1, Certified Asterisk 1.8.11 before 1.8.11-cert7, Asterisk Digiumphones 10.x.x-digiumphones before 10.7.1-digiumphones, and Asterisk Business Edition C.3.x before C.3.7.6 does not enforce ACL rules during certain uses of peer credentials, which allows remote authenticated users to bypass intended outbound-call restrictions by leveraging the availability of these credentials. CVE-2012-2186 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2186): Incomplete blacklist vulnerability in main/manager.c in Asterisk Open Source 1.8.x before 1.8.15.1 and 10.x before 10.7.1, Certified Asterisk 1.8.11 before 1.8.11-cert6, Asterisk Digiumphones 10.x.x-digiumphones before 10.7.1-digiumphones, and Asterisk Business Edition C.3.x before C.3.7.6 allows remote authenticated users to execute arbitrary commands by leveraging originate privileges and providing an ExternalIVR value in an AMI Originate action.
Arches, please test and mark stable: =net-misc/asterisk-1.8.15.1 Target KEYWORDS: amd64 x86
amd64 stable
x86 stable
Thanks, everyone. Already on existing GLSA request, ready for a 2nd review.
This issue was resolved and addressed in GLSA 201209-15 at http://security.gentoo.org/glsa/glsa-201209-15.xml by GLSA coordinator Sean Amoss (ackle).