[VOIPSEC] Trixbox Arbitrary Command Execution Vulnerability

Than Taro thanrantaro at live.com
Sun Dec 16 04:41:41 GMT 2007


A
set of scripts were recently discovered in the trixbox line of PBX
products, which connect to a remote host every 24 hours, to retrieve an arbitrary
list of commands to be executed locally.  These scripts were added
under the guise of submitting 'anonymous usage statistics', however,
with the help of DNS pollution, or malice on the part of the sponsoring
company (Fonality), all up-to-date versions of trixbox could be
instantly disabled, or worse.

According to trixbox Community
Director, Kerry Gerrison, a new version of trixbox will be available by
December 18th which will allow you to 'opt-out' (meaning that it will
still be enabled by default) of this behavior.


Further details:
http://www.trixbox.org/forums/trixbox-forums/open-discussion/trixbox-phones-home
http://www.trixbox.org/trixboxs-new-hardware-audting-tool


_________________________________________________________________
Don't get caught with egg on your face. Play Chicktionary!
http://club.live.com/chicktionary.aspx?icid=chick_wlhmtextlink1_dec


More information about the Voipsec mailing list