Vulnerabilites related to digium - asterisk
Vulnerability from fkie_nvd
Published
2013-12-19 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
Buffer overflow in the unpacksms16 function in apps/app_sms.c in Asterisk Open Source 1.8.x before 1.8.24.1, 10.x before 10.12.4, and 11.x before 11.6.1; Asterisk with Digiumphones 10.x-digiumphones before 10.12.4-digiumphones; and Certified Asterisk 1.8.x before 1.8.15-cert4 and 11.x before 11.2-cert3 allows remote attackers to cause a denial of service (daemon crash) via a 16-bit SMS message with an odd number of bytes, which triggers an infinite loop.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "6F368897-A481-42DD-A8B0-8AD43A5FD68B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6BA8F4AF-26C0-4A69-B489-16E7A56E5123", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FE82D53D-092D-4B36-A979-23E9A5E07A78", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "27365383-72DB-4683-9A67-CF553FF2620A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "46EE63D4-CA9C-4DF4-AF85-B8AC2E3F844A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "91407E03-4E98-4DD9-B584-E5BB74F09B9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "669CC22C-45E5-40AB-9A95-D7DFD694B688", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "80A38E0C-45D9-4353-8426-87A4CFA371DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "54A934AE-AB7C-4D10-8BA2-9C54410C648F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "7A7C5A8E-35E6-4B86-8502-1970031AB987", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "1FA4C14B-A01C-4CFE-8985-317ACCDAD209", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "1224686C-8A1E-40E1-ACB9-87F571641EAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "619704FF-2F0C-47E8-A340-58135CEE6B89", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E412E336-871A-4CAC-97E5-FB203BB9349D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.21.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "FC1A0E66-63F4-4BD0-8C9A-3D23A116EE08", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.21.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "79963FF0-5ED6-41B6-8E60-146BD7879518", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "B63FB1C5-9704-4C6A-8DE6-2283D1993BA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.22.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0787BC7B-9464-4AAA-896B-C028ECF8E397", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.22.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "84C0FBC8-9CD1-4135-94C7-BE90A7C94625", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "DE14D16B-4903-47BD-BCBD-28A8B6B878E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "FD3948A1-B5A6-4702-9187-A7720E81B7F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "BC097BB6-02E9-4F48-98CB-B5F31B41009C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "0992625B-012F-40EA-9A20-6352E633F62B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "E3828876-DDB4-457D-8E50-43A4FF761005", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.10.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "79283554-AF08-44DC-BF98-446C47AA490A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "54EBFD0B-686F-477F-8FF2-535F24A3348B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.11.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0961F130-FF8C-41C2-BF2E-9731ED9EB73B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.11.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "BE78F4A2-B165-446C-AA1C-7A9E13718C6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.11.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9789FC49-DE20-4477-B9D5-12CB71F42E58", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "2DD97918-B589-4422-B695-C3C00203A3DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.12.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "A1E59E84-F3FF-44FF-BC7D-31F3880E32F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.12.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "2D9C7006-F5B1-4171-BB44-182C39DE3AAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "C8D2B210-3ADA-40AD-A575-DB88A9F71C91", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F7C53CD-260C-49F5-BCA4-E1D0A58E0B29", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F53B8453-F35A-49BE-8129-774BADF71BA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "CCB0C07E-DA2F-4169-848D-C3315CDC1CB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "410C43E6-5912-4C22-A592-7CF94402EEB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D50A355E-1B55-4DD2-8100-EB81AA6FC40E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "9ADF4230-EFEB-45EC-9C96-0262B4A3E459", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "5234531C-F69A-4B94-A480-147734206C5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "321C1066-6800-4488-A7C4-BE91FF738453", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9B51588-50A2-40B2-A007-06F57D38C7AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CDE2B00C-6AC0-4166-8A25-EFC42CE7F737", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "617FC4AF-D152-4EE1-828D-C2A6AD0DFD3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3A3FE6DC-17FD-4CEE-BDFB-9D4685640381", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8CEEB6C2-0A6D-4434-8446-CB8605CD3B14", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "1548C574-CD51-49F6-91B1-B06C504000E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D56C2C11-4B42-43AB-9DAE-61C15D107160", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "69F2DED4-39F5-44C8-BEA3-22692D28C631", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "AD172E70-238B-4B01-A922-8021B5627092", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "C689A32B-E87D-492F-B3F6-7B80DFA049C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5FB3863D-7F46-4C4A-9E6B-C255CDF0D953", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "7239304D-C383-4F26-BB08-65ADD2380015", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "1AC153C2-258E-4EE6-845F-8E8C68AA242D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "229B7982-9775-42AA-B8F5-FE920CCAA497", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "326845DF-2DB2-406B-BE0F-877384DAACFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.5.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E0FC2D46-FD1B-421F-8773-BB41B1E9A831", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "8788AF7B-CBB6-4D9D-A748-486787935A96", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "CB19B2F7-5685-449F-858C-C226D2A373B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D10B9E8C-3B72-490B-A276-A745299DA3C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E63CF763-0682-4453-8D07-C9253C179486", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "1FDB7AA1-25A7-4BED-A875-C0494E973EA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.11.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "E0BCE319-8C87-4521-BEAA-02F0EF47B315", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.11.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "5A2534F0-3DEE-4FCB-B15D-97D1836CE83D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.11.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "D3F38B78-8215-43D6-8C5C-6DB8E6C34F06", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "CE54B76B-4713-4281-AB4B-B17901121B89", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.12.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "08EE9963-2A44-48A0-8A1B-919CCE3652FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.12.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "19C7B58B-6591-45B5-B527-50FA0A5BD1A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "05D3825F-3B95-4056-AF3C-43269734BA2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "806F60DA-FAA1-4C13-889B-0FF518C01E44", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:*:*:*:*:*:*:*", "matchCriteriaId": "E6DDE265-B4B9-495A-95F7-0910E8199980", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1:*:*:*:*:*:*", "matchCriteriaId": "2365F1EE-16A4-4293-B80E-A51CD6A2F112", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1-rc1:*:*:*:*:*:*", "matchCriteriaId": "6B7AE7FB-8170-41AD-9597-07335D36AE48", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1-rc2:*:*:*:*:*:*", "matchCriteriaId": "9131FB32-E3F0-476C-A0D1-36E2101631D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1-rc3:*:*:*:*:*:*", "matchCriteriaId": "5209356B-4A86-4C93-9D04-C66969F23BC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert2:*:*:*:*:*:*", "matchCriteriaId": "F087C546-FBCA-4D0D-A023-8F9384CD160C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:rc1:*:*:*:*:*:*", "matchCriteriaId": "9AF5750B-2348-4E35-9F08-27E2385E329F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C0344FE7-952A-4BC5-A31F-F2C5EABDB5FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.2.0:cert1:*:*:*:*:*:*", "matchCriteriaId": "960521C4-9004-4412-8A38-66240C4B875D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "00F26342-110F-4163-AD11-98AA3B71D299", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "8652FA73-2F02-401C-890F-0544276294D3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the unpacksms16 function in apps/app_sms.c in Asterisk Open Source 1.8.x before 1.8.24.1, 10.x before 10.12.4, and 11.x before 11.6.1; Asterisk with Digiumphones 10.x-digiumphones before 10.12.4-digiumphones; and Certified Asterisk 1.8.x before 1.8.15-cert4 and 11.x before 11.2-cert3 allows remote attackers to cause a denial of service (daemon crash) via a 16-bit SMS message with an odd number of bytes, which triggers an infinite loop." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en la funci\u00f3n unpacksms16 en apps/app_sms.c en Asterisk Open Source 1.8.x en versiones anteriores a 1.8.24.1, 10.x en versiones anteriores a 10.12.4 y 11.x en versiones anteriores a 11.6.1; Asterisk con Digiumphones 10.x-digiumphones en versiones anteriores a 10.12.4-digiumphones y Certified Asterisk 1.8.x en versiones anteriores a 1.8.15-cert4 y 11.x en versiones anteriores a 11.2-cert3 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de demonio) a trav\u00e9s de un mensaje 16-bit SMS con un n\u00famero impar de bytes, lo que desencadena un bucle infinito." } ], "id": "CVE-2013-7100", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-12-19T22:55:04.570", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2013-12/0089.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2013-006.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/101100" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/56294" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2014/dsa-2835" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:300" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/64364" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1029499" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89825" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-22590" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2013-12/0089.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2013-006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/101100" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/56294" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2014/dsa-2835" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:300" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/64364" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1029499" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89825" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-22590" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-03-31 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
manager.c in Asterisk Open Source 1.6.1.x before 1.6.1.24, 1.6.2.x before 1.6.2.17.2, and 1.8.x before 1.8.3.2 allows remote attackers to cause a denial of service (CPU and memory consumption) via a series of manager sessions involving invalid data.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "DBFF2686-0F5C-4F20-AA93-6B63C5ADCD82", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1:beta1:*:*:*:*:*:*", "matchCriteriaId": "6D4A9B22-7978-44F3-A30C-65FE7024AB6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1:beta2:*:*:*:*:*:*", "matchCriteriaId": "06219062-9CAD-49D2-823E-E11E74B131D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1:beta3:*:*:*:*:*:*", "matchCriteriaId": "91420C0D-C63B-4916-8335-6BE24EB738FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1:beta4:*:*:*:*:*:*", "matchCriteriaId": "FD1D7D08-AC94-49AC-9F16-A6E91F1F1EEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "05FDA8EA-6610-4D49-9825-34EBFAAD2691", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B8FE4BCF-9AE7-4F41-BA84-E9537CC1EBE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F25B0D15-7C09-4BBB-AC84-A1898F448DB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F259057F-3720-45D8-91B4-70A11B759794", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "A106C460-4CE2-4AC3-B2FD-310F05507511", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "3E119FF9-2AD3-450D-8BBF-C6DD063246EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "759221D5-FC37-446D-9628-233B8D0B9120", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F82D4812-0429-42D4-BD27-C76CB9E7C368", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8FE11D6-8C0A-450E-B6DA-3AFE04D82232", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "5D1FBCC8-4637-4A67-BFFD-C052C3C03C12", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "F7307E10-9FA5-4940-B837-7936384F61DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "3D0DC9D6-D4D6-46CB-98DA-F4FC1835B6B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBBD0747-F3FF-46D8-A3C4-8268E37BC5AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.7:rc1:*:*:*:*:*:*", "matchCriteriaId": "3F759F27-008E-47FB-AC0A-EF11DA19918E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.7:rc2:*:*:*:*:*:*", "matchCriteriaId": "D15C82BA-BD1F-4A19-A907-E6C30042F537", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "2E802481-C8BD-4218-8CDC-5DB112DA946C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "D6FC8A53-E3C0-4660-BE75-2B5B8B4F8160", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "93C020CD-D0EA-4B3E-B33C-F900B08B28FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:rc1:*:*:*:*:*:*", "matchCriteriaId": "0004AADE-1652-4242-A97D-E9818FE03CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:rc2:*:*:*:*:*:*", "matchCriteriaId": "543E9C91-60FE-43AE-9B94-08DD730BA814", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:rc3:*:*:*:*:*:*", "matchCriteriaId": "252849FA-F46E-4F5A-A488-AA53574CA884", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "9EB89B4F-9546-4DF0-B69F-1B9F289BB1E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "2E254415-1D59-4A77-80FB-AE3EF10FBB32", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.12:rc1:*:*:*:*:*:*", "matchCriteriaId": "DF2407D0-C324-45C4-9FBB-4294F747DBDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "F23A36CC-9AA2-4559-946D-6D0621664342", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.13:rc1:*:*:*:*:*:*", "matchCriteriaId": "89C40652-E180-416A-B88A-E6313530E98A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "A28C2C5D-A573-4036-A600-BE28A3E417B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.15:rc2:*:*:*:*:*:*", "matchCriteriaId": "EE162390-359F-4C5D-902B-275FB1FC3EF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "4A0A3750-0D34-4FB5-B897-17CA0D0B7CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "D11BE58D-5B7E-4BB5-988A-7FC2E4B92C4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "22631AE6-5DA1-46C6-A239-C232DA0D0E7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.18:rc1:*:*:*:*:*:*", "matchCriteriaId": "9F5CB8CC-4CC1-4A1B-8AD1-C876D1BC80EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.18:rc2:*:*:*:*:*:*", "matchCriteriaId": "8591DB43-EAA0-4D58-BA23-EAD916DEA3DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "4E4747F8-1AFC-4AEF-82D8-D6604FB5222E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.19:rc1:*:*:*:*:*:*", "matchCriteriaId": "B82172C9-EA5B-4FC9-A445-0A297AE56FF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.19:rc2:*:*:*:*:*:*", "matchCriteriaId": "0C71CDAB-A299-4F1D-942D-851C899E63BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.19:rc3:*:*:*:*:*:*", "matchCriteriaId": "E2FA9AB9-4C83-45A3-9772-3A16030DBF1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "A88C639A-9229-4D99-9087-1B0B95539BD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.20:rc1:*:*:*:*:*:*", "matchCriteriaId": "0B7DE987-7351-495A-8776-37E6B7BF0C0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.20:rc2:*:*:*:*:*:*", "matchCriteriaId": "CB5823CC-941F-47AB-AD1F-325181D40E60", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "712AF374-846D-4F21-91C4-1BA9AB33E46D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "E431AF4E-C6A8-424F-9205-01F5FDFB3306", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "52BE29C5-C2C3-4414-A8E1-4D4D926F6E65", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1F8B700A-FACB-4BC8-9DF2-972DC63D852B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FFD31B9B-2F43-4637-BE56-47A807384BF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "E6450D6B-C907-49E6-9788-E4029C09285F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "DDB0432E-024A-4C0C-87FF-448E513D2834", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "D6A6A343-FEA2-49E5-9858-455AE3B29470", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc6:*:*:*:*:*:*", "matchCriteriaId": "D57B94E3-EA37-466C-ADC4-5180D4502FDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc7:*:*:*:*:*:*", "matchCriteriaId": "64D35A89-6B21-4770-AA0F-424C5C91A254", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc8:*:*:*:*:*:*", "matchCriteriaId": "14817302-A34A-4980-B148-AEB4B3B49BE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "61FDFA96-E62A-413B-9846-F51F1F7349EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "DA924386-49F6-4371-B975-B1473EEA12F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "B74A1B99-8901-4690-B994-1DAD3EFA5ABB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "4253C7DD-3588-4B35-B96D-C027133BE93F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "24AE11DB-16D3-42BF-BC64-E8982107D35B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "53841D77-926C-4362-BC85-BD8B6AC4391D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "F98FD6E6-EDE9-437D-B7C2-2DB65B73D230", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "4BA6CA77-D358-4623-8400-78EFC47ADB7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "B4E62DAB-45E0-4EAA-8E45-6D3757A679D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.15:rc1:*:*:*:*:*:*", "matchCriteriaId": "1355578C-B384-401A-9123-2789CBECAD0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "3491F8DB-A162-4608-B5F9-5401FE058CEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16:rc1:*:*:*:*:*:*", "matchCriteriaId": "C52730A8-D96E-46C1-8905-1D78A93E9C84", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "C6E5CD17-B14A-4BDB-BA75-261344FF6F25", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "EEED6C07-CFB7-44DC-9A41-9B6271942123", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:rc1:*:*:*:*:*:*", "matchCriteriaId": "0864DAF9-B7FA-4018-99F4-F2A7AA6FBBB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:rc2:*:*:*:*:*:*", "matchCriteriaId": "694B257B-E73B-4534-B316-87284FA45534", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:rc3:*:*:*:*:*:*", "matchCriteriaId": "418FD91F-014E-4529-8D72-D3FB27788EEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "D213EC93-0D4F-4BD9-9F13-9A9E705135EB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6344E43-E8AA-4340-B3A7-72F5D6A5D184", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "4C170C1C-909D-4439-91B5-DB1A9CD150C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EE821BE5-B1D3-4854-A700-3A83E5F15724", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "149C57CA-0B4B-4220-87FC-432418D1C393", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "035595D5-BBEC-4D85-AD7A-A2C932D2BA70", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "6DAF5655-F09F-47F8-AFA6-4B95F77A57F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F8E001D8-0A7B-4FDD-88E3-E124ED32B81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9D5CFFBD-785F-4417-A54A-F3565FD6E736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "D30EF999-92D1-4B19-8E32-1E4B35DE4EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "A67D156B-9C43-444F-ADEC-B21D99D1433C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "893EB152-6444-43DB-8714-9735354C873A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8447EE7-A834-41D7-9204-07BD3752870C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C04F2C9-5672-42F2-B664-A3EE4C954C29", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "33465668-4C91-4619-960A-D26D77853E53", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "CAD08674-0B44-44EA-940B-6812E2D5077D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "EEE87710-A129-43AA-BA08-8001848975FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F582C6E-5DA0-4D72-A40E-66BDBC5CF2B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CEBB8-01B3-4A05-AFE8-37A143C9833E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "2FAC47DD-B613-43E4-B9BF-6120B81D9789", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "86D20CB5-60E8-405E-B387-CF80C7DA5E07", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "71AB5A01-5961-4053-9111-CF32C6473A00", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*", "matchCriteriaId": "77D8E1DC-041F-4B87-AF9A-E0EC4D6A4BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7CCCB892-30CE-4BEF-904E-5D957F94D0EB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "manager.c in Asterisk Open Source 1.6.1.x before 1.6.1.24, 1.6.2.x before 1.6.2.17.2, and 1.8.x before 1.8.3.2 allows remote attackers to cause a denial of service (CPU and memory consumption) via a series of manager sessions involving invalid data." }, { "lang": "es", "value": "manager.c en Asterisk Open Source v1.6.1.x anterior a v1.6.1.24, v1.6.2.x anterior a v1.6.2.17.2, y v1.8.x anterior a v1.8.3.2 permite a atacantes remotos generar una denegaci\u00f3n de servicio (agotamiento de memoria y CPU) mediante una conjunto de sesiones que comprenden datos no v\u00e1lidos." } ], "id": "CVE-2011-1174", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-03-31T22:55:03.147", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2011-003.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056945.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057156.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057163.html" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2011/03/17/5" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2011/03/21/12" }, { "source": "secalert@redhat.com", "url": "http://securitytracker.com/id?1025223" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2011/dsa-2225" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/46897" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0686" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0790" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=688675" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66139" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2011-003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056945.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057156.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057163.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2011/03/17/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2011/03/21/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1025223" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2225" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46897" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0686" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0790" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=688675" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66139" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-11-09 00:29
Modified
2025-04-20 01:37
Severity ?
Summary
An issue was discovered in Asterisk Open Source 13 before 13.18.1, 14 before 14.7.1, and 15 before 15.1.1 and Certified Asterisk 13.13 before 13.13-cert7. A memory leak occurs when an Asterisk pjsip session object is created and that call gets rejected before the session itself is fully established. When this happens the session object never gets destroyed. Eventually Asterisk can run out of memory and crash.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digium | asterisk | * | |
digium | asterisk | * | |
digium | asterisk | * | |
digium | certified_asterisk | 13.13.0 | |
digium | certified_asterisk | 13.13.0 | |
digium | certified_asterisk | 13.13.0 | |
digium | certified_asterisk | 13.13.0 | |
digium | certified_asterisk | 13.13.0 | |
digium | certified_asterisk | 13.13.0 | |
digium | certified_asterisk | 13.13.0 | |
digium | certified_asterisk | 13.13.0 | |
digium | certified_asterisk | 13.13.0 | |
digium | certified_asterisk | 13.13.0 | |
digium | certified_asterisk | 13.13.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "88EDB1A9-AC31-4A47-A222-0C4E17274A02", "versionEndExcluding": "13.18.1", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "5861B3BC-A35A-4617-A24E-F88D27DBE3F6", "versionEndExcluding": "14.7.1", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "651DC4FA-A4EF-40DC-9B54-3ED928A7531A", "versionEndExcluding": "15.1.1", "versionStartIncluding": "15.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "7233B5A2-E1CE-4B7E-99FA-26369B892B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1:*:*:*:*:*:*", "matchCriteriaId": "F051FE7D-0695-4552-BC1C-836076825606", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1_rc1:*:*:*:*:*:*", "matchCriteriaId": "2E9DFD7C-9ED1-4561-8AFF-69D98E8E398D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1_rc2:*:*:*:*:*:*", "matchCriteriaId": "CA8BFAC6-17A7-4B80-B436-0FFA4B9EA22A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1_rc3:*:*:*:*:*:*", "matchCriteriaId": "954376A0-A03C-47D9-BC5E-14B005DB3940", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1_rc4:*:*:*:*:*:*", "matchCriteriaId": "07BB081F-504D-42E3-9CDE-4005572CA0CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13.0:cert2:*:*:*:*:*:*", "matchCriteriaId": "9F379170-DC3B-41B8-B950-7E0E1E6002AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13.0:cert3:*:*:*:*:*:*", "matchCriteriaId": "338BFA7B-AA84-483F-B298-BC932728E0EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13.0:cert4:*:*:*:*:*:*", "matchCriteriaId": "0A4D417F-485E-4CAD-8542-A22BBA2869E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13.0:cert5:*:*:*:*:*:*", "matchCriteriaId": "61F70CD2-1727-4955-A81B-8927AEF468ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13.0:cert6:*:*:*:*:*:*", "matchCriteriaId": "A9437455-90FB-4F90-B246-A37E558C9CE5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Asterisk Open Source 13 before 13.18.1, 14 before 14.7.1, and 15 before 15.1.1 and Certified Asterisk 13.13 before 13.13-cert7. A memory leak occurs when an Asterisk pjsip session object is created and that call gets rejected before the session itself is fully established. When this happens the session object never gets destroyed. Eventually Asterisk can run out of memory and crash." }, { "lang": "es", "value": "Se descubri\u00f3 un problema en Asterisk Open Source en versiones 13 anteriores a la 13.18.1, versiones 14 anteriores a la 14.7.1 y versiones 15 antes de la 15.1.1 y en Certified Asterisk 13.13 en versiones anteriores a la 13.13-cert7. Ocurre una fuga de memoria cuando un objeto de sesi\u00f3n pjsip de Asterisk se crea y la llamada se rechaza antes de que la sesi\u00f3n se establezca por completo. Cuando esto ocurre, el objeto de sesi\u00f3n nunca se destruye. Asterisk podr\u00eda quedarse sin memoria y cerrarse de manera inesperada." } ], "id": "CVE-2017-16672", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-09T00:29:00.520", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.digium.com/pub/security/AST-2017-011.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101765" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27345" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/201811-11" }, { "source": "cve@mitre.org", "url": "https://www.debian.org/security/2017/dsa-4076" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.digium.com/pub/security/AST-2017-011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101765" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27345" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201811-11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2017/dsa-4076" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-772" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-12-15 03:57
Modified
2025-04-11 00:51
Severity ?
Summary
The handle_request_info function in channels/chan_sip.c in Asterisk Open Source 1.6.2.x before 1.6.2.21 and 1.8.x before 1.8.7.2, when automon is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted sequence of SIP requests.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6344E43-E8AA-4340-B3A7-72F5D6A5D184", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "4C170C1C-909D-4439-91B5-DB1A9CD150C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EE821BE5-B1D3-4854-A700-3A83E5F15724", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "149C57CA-0B4B-4220-87FC-432418D1C393", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "035595D5-BBEC-4D85-AD7A-A2C932D2BA70", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "6DAF5655-F09F-47F8-AFA6-4B95F77A57F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F8E001D8-0A7B-4FDD-88E3-E124ED32B81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9D5CFFBD-785F-4417-A54A-F3565FD6E736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "D30EF999-92D1-4B19-8E32-1E4B35DE4EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "A67D156B-9C43-444F-ADEC-B21D99D1433C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "893EB152-6444-43DB-8714-9735354C873A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8447EE7-A834-41D7-9204-07BD3752870C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C04F2C9-5672-42F2-B664-A3EE4C954C29", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "33465668-4C91-4619-960A-D26D77853E53", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "CAD08674-0B44-44EA-940B-6812E2D5077D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "EEE87710-A129-43AA-BA08-8001848975FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F582C6E-5DA0-4D72-A40E-66BDBC5CF2B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CEBB8-01B3-4A05-AFE8-37A143C9833E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "522733A7-E89E-4BFD-AC93-D6882636E880", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "2FAC47DD-B613-43E4-B9BF-6120B81D9789", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "86D20CB5-60E8-405E-B387-CF80C7DA5E07", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "71AB5A01-5961-4053-9111-CF32C6473A00", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*", "matchCriteriaId": "77D8E1DC-041F-4B87-AF9A-E0EC4D6A4BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7CCCB892-30CE-4BEF-904E-5D957F94D0EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "F156798F-F2EF-4366-B17E-03165AB437D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "9EFBB9A6-DD1D-436E-919F-74A3E4F40396", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "054E34C8-B6A5-48C7-938E-D3C268E0E8BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*", "matchCriteriaId": "1DCECA72-533A-4A95-AB19-20C5F09A1B01", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*", "matchCriteriaId": "0E2309F8-AFEE-4150-99D1-BA606432ED73", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*", "matchCriteriaId": "7785F282-BFA0-400A-8398-872ACCA4BF37", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1278D3FB-78C6-4F7D-A845-0A93D4F6E2B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "C00A6EFB-A848-46D3-AAD7-FD8140007E42", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "CB6E3972-5C53-4B6D-BFE1-67E1122EA013", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "048617A0-A783-4519-A947-35220D4CD786", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "DD493A41-E686-444C-A34E-412804510F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "87D25FD6-CC3A-4AB0-B7B1-67D07386F99D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C402E9E-09CC-4EFA-AC27-156437B05B22", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C8A41F9C-D2F4-47A9-80CD-2B1BF6B0CB63", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "627FF5B9-E5A8-4DBC-A891-B175011E72A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6146EB2E-BA32-4408-B10B-A711EC39C580", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "1C863324-05AE-4FCA-BD2E-39040A468DCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A85F51E7-0AAE-4F3B-9F90-BD2E31255822", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "315FB0D4-D4A4-4369-BFB8-F2CAEB429015", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "DC74D6C5-F410-4B68-AF92-056B727193A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "B70911F8-A526-4600-8198-03FF4CCB28DE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1F8B700A-FACB-4BC8-9DF2-972DC63D852B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FFD31B9B-2F43-4637-BE56-47A807384BF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "E6450D6B-C907-49E6-9788-E4029C09285F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "DDB0432E-024A-4C0C-87FF-448E513D2834", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "D6A6A343-FEA2-49E5-9858-455AE3B29470", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc6:*:*:*:*:*:*", "matchCriteriaId": "D57B94E3-EA37-466C-ADC4-5180D4502FDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc7:*:*:*:*:*:*", "matchCriteriaId": "64D35A89-6B21-4770-AA0F-424C5C91A254", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc8:*:*:*:*:*:*", "matchCriteriaId": "14817302-A34A-4980-B148-AEB4B3B49BE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "61FDFA96-E62A-413B-9846-F51F1F7349EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "DA924386-49F6-4371-B975-B1473EEA12F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "B74A1B99-8901-4690-B994-1DAD3EFA5ABB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "4253C7DD-3588-4B35-B96D-C027133BE93F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "24AE11DB-16D3-42BF-BC64-E8982107D35B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "53841D77-926C-4362-BC85-BD8B6AC4391D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "F98FD6E6-EDE9-437D-B7C2-2DB65B73D230", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "4BA6CA77-D358-4623-8400-78EFC47ADB7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "B4E62DAB-45E0-4EAA-8E45-6D3757A679D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.15:rc1:*:*:*:*:*:*", "matchCriteriaId": "1355578C-B384-401A-9123-2789CBECAD0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "3491F8DB-A162-4608-B5F9-5401FE058CEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16:rc1:*:*:*:*:*:*", "matchCriteriaId": "C52730A8-D96E-46C1-8905-1D78A93E9C84", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "C6E5CD17-B14A-4BDB-BA75-261344FF6F25", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "63C8DBF5-6992-4618-BD2D-56F1F98EAE3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "EEED6C07-CFB7-44DC-9A41-9B6271942123", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:rc1:*:*:*:*:*:*", "matchCriteriaId": "0864DAF9-B7FA-4018-99F4-F2A7AA6FBBB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:rc2:*:*:*:*:*:*", "matchCriteriaId": "694B257B-E73B-4534-B316-87284FA45534", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:rc3:*:*:*:*:*:*", "matchCriteriaId": "418FD91F-014E-4529-8D72-D3FB27788EEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "D213EC93-0D4F-4BD9-9F13-9A9E705135EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17.2:*:*:*:*:*:*:*", "matchCriteriaId": "2E9D2091-B292-4D6E-A91F-58D24BD5A5E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17.3:*:*:*:*:*:*:*", "matchCriteriaId": "CFF196A0-87E1-4DD2-8CDA-B19EB6F71312", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "6F59B7C5-8EF3-495E-9A91-9C96E6DF41E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.18:rc1:*:*:*:*:*:*", "matchCriteriaId": "D9020FF4-645B-4E98-8CB0-3F8DF7C5841B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "4F0B515F-6C5B-4A32-BE6E-3B154B4340CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.19:rc1:*:*:*:*:*:*", "matchCriteriaId": "679A2262-1C6B-4549-84A9-878D7FA502F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "86B7F9F0-A597-42BC-AD54-FAD928B7A332", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.21:*:*:*:*:*:*:*", "matchCriteriaId": "76A47DCB-689A-4BD5-B3A5-7DA20052A3B6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The handle_request_info function in channels/chan_sip.c in Asterisk Open Source 1.6.2.x before 1.6.2.21 and 1.8.x before 1.8.7.2, when automon is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted sequence of SIP requests." }, { "lang": "es", "value": "La funci\u00f3n handle_request_info en el archivo channels/chan_sip.c en Open Source de Asterisk versiones 1.6.2.x anteriores a 1.6.2.21 y versiones 1.8.x anteriores a 1.8.7.2, cuando automon est\u00e1 habilitado, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (desreferencia del puntero NULL y bloqueo del demonio) por medio de una secuencia dise\u00f1ada de peticiones SIP." } ], "id": "CVE-2011-4598", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-12-15T03:57:34.357", "references": [ { "source": "secalert@redhat.com", "url": "http://downloads.asterisk.org/pub/security/AST-2011-014.html" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2011/12/09/3" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2011/12/09/4" }, { "source": "secalert@redhat.com", "url": "http://osvdb.org/77598" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/47273" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2011/dsa-2367" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://downloads.asterisk.org/pub/security/AST-2011-014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2011/12/09/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2011/12/09/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/77598" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/47273" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2367" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-02-22 00:29
Modified
2024-11-21 04:11
Severity ?
Summary
A NULL pointer access issue was discovered in Asterisk 15.x through 15.2.1. The RTP support in Asterisk maintains its own registry of dynamic codecs and desired payload numbers. While an SDP negotiation may result in a codec using a different payload number, these desired ones are still stored internally. When an RTP packet was received, this registry would be consulted if the payload number was not found in the negotiated SDP. This registry was incorrectly consulted for all packets, even those which are dynamic. If the payload number resulted in a codec of a different type than the RTP stream (for example, the payload number resulted in a video codec but the stream carried audio), a crash could occur if no stream of that type had been negotiated. This was due to the code incorrectly assuming that a stream of that type would always exist.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://downloads.asterisk.org/pub/security/AST-2018-001.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/103149 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1040415 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://downloads.asterisk.org/pub/security/AST-2018-001.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/103149 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040415 | Third Party Advisory, VDB Entry |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "D63485A9-4464-49C7-ACF8-826303D8C152", "versionEndIncluding": "15.2.1", "versionStartIncluding": "15.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A NULL pointer access issue was discovered in Asterisk 15.x through 15.2.1. The RTP support in Asterisk maintains its own registry of dynamic codecs and desired payload numbers. While an SDP negotiation may result in a codec using a different payload number, these desired ones are still stored internally. When an RTP packet was received, this registry would be consulted if the payload number was not found in the negotiated SDP. This registry was incorrectly consulted for all packets, even those which are dynamic. If the payload number resulted in a codec of a different type than the RTP stream (for example, the payload number resulted in a video codec but the stream carried audio), a crash could occur if no stream of that type had been negotiated. This was due to the code incorrectly assuming that a stream of that type would always exist." }, { "lang": "es", "value": "Se ha descubierto un problema de acceso a puntero NULL en las versiones 15.x de Asterisk hasta la versi\u00f3n 15.2.1. El soporte RTP en Asterisk mantiene su propio registro de c\u00f3decs din\u00e1micos y n\u00fameros de carga \u00fatil deseados. Aunque una negociaci\u00f3n SDP puede resultar en que un c\u00f3dec emplee un n\u00famero de carga \u00fatil diferente, aquellos que se deseen se siguen almacenando internamente. Cuando se recib\u00eda un paquete RTP, este registro ser\u00eda consultado si el n\u00famero de carga \u00fatil no se encontraba en el SDP negociado. Este registro se consultaba err\u00f3neamente para todos los paquetes, incluso los din\u00e1micos. Si el n\u00famero de carga \u00fatil resultaba en un c\u00f3dec con tipo diferente a la transmisi\u00f3n RTP (por ejemplo, el n\u00famero de payload resultaba en un c\u00f3dec de v\u00eddeo, pero la transmisi\u00f3n conten\u00eda audio), podr\u00eda ocurrir un cierre inesperado si no se hab\u00eda negociado una transmisi\u00f3n de ese tipo. Esto se debe a que el c\u00f3digo asume err\u00f3neamente que una transmisi\u00f3n de este tipo existir\u00eda siempre." } ], "id": "CVE-2018-7285", "lastModified": "2024-11-21T04:11:56.460", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-22T00:29:01.063", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2018-001.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103149" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040415" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2018-001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103149" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040415" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-23 19:29
Modified
2024-11-21 02:58
Severity ?
Summary
asterisk 13.10.0 is affected by: denial of service issues in asterisk. The impact is: cause a denial of service (remote).
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:13.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "66595711-8573-4A9B-A8FE-4943E3097AA8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "asterisk 13.10.0 is affected by: denial of service issues in asterisk. The impact is: cause a denial of service (remote)." }, { "lang": "es", "value": "asterisk versi\u00f3n 13.10.0, se ve afectado por: problemas de Denegaci\u00f3n de Servicio en asterisk. El impacto es: provocar una Denegaci\u00f3n de Servicio (remota)." } ], "id": "CVE-2016-7550", "lastModified": "2024-11-21T02:58:11.820", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-23T19:29:00.243", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2016-006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2016-006.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-06 19:55
Modified
2025-04-11 00:51
Severity ?
Summary
reqresp_parser.c in the SIP channel driver in Asterisk Open Source 1.8.x before 1.8.4.2 does not initialize certain strings, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed Contact header.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digium | asterisk | 1.8.0 | |
digium | asterisk | 1.8.0 | |
digium | asterisk | 1.8.0 | |
digium | asterisk | 1.8.0 | |
digium | asterisk | 1.8.0 | |
digium | asterisk | 1.8.0 | |
digium | asterisk | 1.8.0 | |
digium | asterisk | 1.8.0 | |
digium | asterisk | 1.8.0 | |
digium | asterisk | 1.8.0 | |
digium | asterisk | 1.8.1 | |
digium | asterisk | 1.8.1 | |
digium | asterisk | 1.8.1.1 | |
digium | asterisk | 1.8.1.2 | |
digium | asterisk | 1.8.2 | |
digium | asterisk | 1.8.2.1 | |
digium | asterisk | 1.8.2.2 | |
digium | asterisk | 1.8.2.3 | |
digium | asterisk | 1.8.2.4 | |
digium | asterisk | 1.8.3 | |
digium | asterisk | 1.8.3 | |
digium | asterisk | 1.8.3 | |
digium | asterisk | 1.8.3 | |
digium | asterisk | 1.8.3.1 | |
digium | asterisk | 1.8.3.2 | |
digium | asterisk | 1.8.3.3 | |
digium | asterisk | 1.8.4 | |
digium | asterisk | 1.8.4 | |
digium | asterisk | 1.8.4 | |
digium | asterisk | 1.8.4 | |
digium | asterisk | 1.8.4.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6344E43-E8AA-4340-B3A7-72F5D6A5D184", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "4C170C1C-909D-4439-91B5-DB1A9CD150C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EE821BE5-B1D3-4854-A700-3A83E5F15724", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "149C57CA-0B4B-4220-87FC-432418D1C393", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "035595D5-BBEC-4D85-AD7A-A2C932D2BA70", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "6DAF5655-F09F-47F8-AFA6-4B95F77A57F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F8E001D8-0A7B-4FDD-88E3-E124ED32B81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9D5CFFBD-785F-4417-A54A-F3565FD6E736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "D30EF999-92D1-4B19-8E32-1E4B35DE4EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "A67D156B-9C43-444F-ADEC-B21D99D1433C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "893EB152-6444-43DB-8714-9735354C873A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8447EE7-A834-41D7-9204-07BD3752870C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C04F2C9-5672-42F2-B664-A3EE4C954C29", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "33465668-4C91-4619-960A-D26D77853E53", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "CAD08674-0B44-44EA-940B-6812E2D5077D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "EEE87710-A129-43AA-BA08-8001848975FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F582C6E-5DA0-4D72-A40E-66BDBC5CF2B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CEBB8-01B3-4A05-AFE8-37A143C9833E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "522733A7-E89E-4BFD-AC93-D6882636E880", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "2FAC47DD-B613-43E4-B9BF-6120B81D9789", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "86D20CB5-60E8-405E-B387-CF80C7DA5E07", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "71AB5A01-5961-4053-9111-CF32C6473A00", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*", "matchCriteriaId": "77D8E1DC-041F-4B87-AF9A-E0EC4D6A4BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7CCCB892-30CE-4BEF-904E-5D957F94D0EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "F156798F-F2EF-4366-B17E-03165AB437D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "9EFBB9A6-DD1D-436E-919F-74A3E4F40396", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "054E34C8-B6A5-48C7-938E-D3C268E0E8BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*", "matchCriteriaId": "1DCECA72-533A-4A95-AB19-20C5F09A1B01", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*", "matchCriteriaId": "0E2309F8-AFEE-4150-99D1-BA606432ED73", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*", "matchCriteriaId": "7785F282-BFA0-400A-8398-872ACCA4BF37", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1278D3FB-78C6-4F7D-A845-0A93D4F6E2B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "reqresp_parser.c in the SIP channel driver in Asterisk Open Source 1.8.x before 1.8.4.2 does not initialize certain strings, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed Contact header." }, { "lang": "es", "value": "reqresp_parser.c del driver del canal SIP en Asterisk Open Source v1.8.x antes de v1.8.4.2 no inicializa ciertas cadenas,lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio ( desreferenciar un puntero NULL y ca\u00edda de demonio ) a trav\u00e9s de un cabecera de contacto con formato incorrecto." } ], "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\r\n\u0027CWE-476: NULL Pointer Dereference\u0027", "id": "CVE-2011-2216", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-06-06T19:55:03.770", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.digium.com/pub/security/AST-2011-007.html" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062658.html" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/062013.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/72752" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/44828" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1025598" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/518236/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/48096" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67812" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.digium.com/pub/security/AST-2011-007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062658.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/062013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/72752" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/44828" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1025598" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/518236/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48096" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67812" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-02-19 20:15
Modified
2024-11-21 05:56
Severity ?
Summary
A stack-based buffer overflow in res_rtp_asterisk.c in Sangoma Asterisk before 16.16.1, 17.x before 17.9.2, and 18.x before 18.2.1 and Certified Asterisk before 16.8-cert6 allows an authenticated WebRTC client to cause an Asterisk crash by sending multiple hold/unhold requests in quick succession. This is caused by a signedness comparison mismatch.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digium | asterisk | * | |
digium | asterisk | * | |
digium | asterisk | * | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "7382B641-0396-456F-BF33-3F6412E35F2D", "versionEndExcluding": "16.16.1", "versionStartIncluding": "16.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5BA8606-ADA9-4841-A7E2-A9165138849A", "versionEndExcluding": "17.9.2", "versionStartIncluding": "17.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE8661F7-03A5-4850-BEF7-E306AECE3037", "versionEndExcluding": "18.2.1", "versionStartIncluding": "18.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:-:*:*:*:*:*:*", "matchCriteriaId": "81C3E390-8B99-4EB8-82DD-02893611209A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc1:*:*:*:*:*:*", "matchCriteriaId": "17DB2297-1908-4F87-8046-2BAA74569D71", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc2:*:*:*:*:*:*", "matchCriteriaId": "CEA2CC40-C2F6-4828-82F0-1B50D3E61F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc3:*:*:*:*:*:*", "matchCriteriaId": "32F19F43-C1E8-4B6C-9356-AF355B7320BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc4:*:*:*:*:*:*", "matchCriteriaId": "21D1FA32-B441-485F-8AE9-F3A394626909", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert2:*:*:*:*:*:*", "matchCriteriaId": "F7795CCF-B160-4B4F-9529-1192C11D7FDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert3:*:*:*:*:*:*", "matchCriteriaId": "0C5E5D0D-9EB3-40FD-8B7E-E93A95D07AB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert4:*:*:*:*:*:*", "matchCriteriaId": "C7DFDA30-DD61-4BBC-AFE4-448BF2A4F303", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc1:*:*:*:*:*:*", "matchCriteriaId": "142F1F89-49AC-4A0B-A273-61F697063A5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc2:*:*:*:*:*:*", "matchCriteriaId": "53041795-788C-4914-A2F6-41539ABE0244", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc3:*:*:*:*:*:*", "matchCriteriaId": "FBB98E65-B2D0-49A4-8BF3-12155E3E13C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc4:*:*:*:*:*:*", "matchCriteriaId": "769C854C-03CD-40A9-B39B-C0CDCA8252EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert5:*:*:*:*:*:*", "matchCriteriaId": "6D86AD6E-4E07-48B0-88D8-E18F277FFE6A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow in res_rtp_asterisk.c in Sangoma Asterisk before 16.16.1, 17.x before 17.9.2, and 18.x before 18.2.1 and Certified Asterisk before 16.8-cert6 allows an authenticated WebRTC client to cause an Asterisk crash by sending multiple hold/unhold requests in quick succession. This is caused by a signedness comparison mismatch." }, { "lang": "es", "value": "Un desbordamiento del b\u00fafer en la regi\u00f3n stack de la memoria en el archivo res_rtp_asterisk.c en Sangoma Asterisk versiones anteriores a 16.16.1, versiones 17.x anteriores a 17.9.2 y versiones 18.x anteriores a 18.2.1 y Certified Asterisk versiones anteriores a 16.8-cert6, permite a un cliente WebRTC autenticado causar un bloqueo de Asterisk mediante el env\u00edo de m\u00faltiples peticiones de hold/unhold en una sucesi\u00f3n r\u00e1pida.\u0026#xa0;Esto es causado por una discrepancia en la comparaci\u00f3n de firmas" } ], "id": "CVE-2021-26713", "lastModified": "2024-11-21T05:56:43.707", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-19T20:15:13.193", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/AST-2021-004.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-29205" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/AST-2021-004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-29205" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-11-09 00:29
Modified
2025-04-20 01:37
Severity ?
Summary
A Buffer Overflow issue was discovered in Asterisk Open Source 13 before 13.18.1, 14 before 14.7.1, and 15 before 15.1.1 and Certified Asterisk 13.13 before 13.13-cert7. No size checking is done when setting the user field for Party B on a CDR. Thus, it is possible for someone to use an arbitrarily large string and write past the end of the user field storage buffer. NOTE: this is different from CVE-2017-7617, which was only about the Party A buffer.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digium | asterisk | * | |
digium | asterisk | * | |
digium | asterisk | * | |
digium | certified_asterisk | 13.13.0 | |
digium | certified_asterisk | 13.13.0 | |
digium | certified_asterisk | 13.13.0 | |
digium | certified_asterisk | 13.13.0 | |
digium | certified_asterisk | 13.13.0 | |
digium | certified_asterisk | 13.13.0 | |
digium | certified_asterisk | 13.13.0 | |
digium | certified_asterisk | 13.13.0 | |
digium | certified_asterisk | 13.13.0 | |
digium | certified_asterisk | 13.13.0 | |
digium | certified_asterisk | 13.13.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "88EDB1A9-AC31-4A47-A222-0C4E17274A02", "versionEndExcluding": "13.18.1", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "5861B3BC-A35A-4617-A24E-F88D27DBE3F6", "versionEndExcluding": "14.7.1", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "651DC4FA-A4EF-40DC-9B54-3ED928A7531A", "versionEndExcluding": "15.1.1", "versionStartIncluding": "15.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "7233B5A2-E1CE-4B7E-99FA-26369B892B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1:*:*:*:*:*:*", "matchCriteriaId": "F051FE7D-0695-4552-BC1C-836076825606", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1_rc1:*:*:*:*:*:*", "matchCriteriaId": "2E9DFD7C-9ED1-4561-8AFF-69D98E8E398D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1_rc2:*:*:*:*:*:*", "matchCriteriaId": "CA8BFAC6-17A7-4B80-B436-0FFA4B9EA22A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1_rc3:*:*:*:*:*:*", "matchCriteriaId": "954376A0-A03C-47D9-BC5E-14B005DB3940", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1_rc4:*:*:*:*:*:*", "matchCriteriaId": "07BB081F-504D-42E3-9CDE-4005572CA0CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13.0:cert2:*:*:*:*:*:*", "matchCriteriaId": "9F379170-DC3B-41B8-B950-7E0E1E6002AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13.0:cert3:*:*:*:*:*:*", "matchCriteriaId": "338BFA7B-AA84-483F-B298-BC932728E0EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13.0:cert4:*:*:*:*:*:*", "matchCriteriaId": "0A4D417F-485E-4CAD-8542-A22BBA2869E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13.0:cert5:*:*:*:*:*:*", "matchCriteriaId": "61F70CD2-1727-4955-A81B-8927AEF468ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13.0:cert6:*:*:*:*:*:*", "matchCriteriaId": "A9437455-90FB-4F90-B246-A37E558C9CE5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Buffer Overflow issue was discovered in Asterisk Open Source 13 before 13.18.1, 14 before 14.7.1, and 15 before 15.1.1 and Certified Asterisk 13.13 before 13.13-cert7. No size checking is done when setting the user field for Party B on a CDR. Thus, it is possible for someone to use an arbitrarily large string and write past the end of the user field storage buffer. NOTE: this is different from CVE-2017-7617, which was only about the Party A buffer." }, { "lang": "es", "value": "Una vulnerabilidad de desbordamiento de b\u00fafer se descubri\u00f3 en Asterisk Open Source en versiones 13 anteriores a la 13.18.1, versiones 14 anteriores a la 14.7.1 y versiones 15 antes de la 15.1.1 y en Certified Asterisk 13.13 en versiones anteriores a la 13.13-cert7. No se realizan chequeos de tama\u00f1o cuando se configura el campo user para Party B en un CDR. Por ello, es posible que alguien utilice una cadena arbitraria con una longitud larga y escriba m\u00e1s all\u00e1 del final del b\u00fafer de almacenamiento del campo user. NOTA: esta vulnerabilidad es diferente de CVE-2017-7617, que solo trataba del b\u00fafer Party A." } ], "id": "CVE-2017-16671", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-09T00:29:00.473", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.digium.com/pub/security/AST-2017-010.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101760" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27337" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/201811-11" }, { "source": "cve@mitre.org", "url": "https://www.debian.org/security/2017/dsa-4076" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.digium.com/pub/security/AST-2017-010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101760" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27337" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201811-11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2017/dsa-4076" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-07-31 10:17
Modified
2025-04-09 00:30
Severity ?
Summary
The IAX2 channel driver (chan_iax2) in Asterisk Open 1.2.x before 1.2.23, 1.4.x before 1.4.9, and Asterisk Appliance Developer Kit before 0.6.0, when configured to allow unauthenticated calls, allows remote attackers to cause a denial of service (resource exhaustion) via a flood of calls that do not complete a 3-way handshake, which causes an ast_channel to be allocated but not released.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "550ACDD4-83E9-470C-A151-51DC311B9C65", "versionEndExcluding": "1.2.23", "versionStartIncluding": "1.2.20", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D5AE015-73F0-450E-AAC4-D60BEE3E71A6", "versionEndExcluding": "1.4.9", "versionStartIncluding": "1.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EB3B452-3577-44C9-AD6C-14982AD5E4A2", "versionEndExcluding": "0.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The IAX2 channel driver (chan_iax2) in Asterisk Open 1.2.x before 1.2.23, 1.4.x before 1.4.9, and Asterisk Appliance Developer Kit before 0.6.0, when configured to allow unauthenticated calls, allows remote attackers to cause a denial of service (resource exhaustion) via a flood of calls that do not complete a 3-way handshake, which causes an ast_channel to be allocated but not released." }, { "lang": "es", "value": "El controlador de canal IAX2 (chan_iax2) de Asterisk Open 1.2.x anterior a 1.2.23, 1.4.x anterior a 1.4.9, y Asterisk Appliance Developer Kit anterior a 0.6.0, cuando est\u00e1 configurado para permitir llamadas no autenticadas, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (agotamiento de recursos) mediante una inundaci\u00f3n de llamadas que no completan la negociaci\u00f3n de 3 pasos, lo cual provoca que se reserve un canal ast_channel pero no se libere." } ], "id": "CVE-2007-4103", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2007-07-31T10:17:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Patch" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-018.pdf" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://osvdb.org/38197" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26274" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/29051" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://securityreason.com/securityalert/2960" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/475069/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/24950" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1018472" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2007/2701" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Patch" ], "url": "http://ftp.digium.com/pub/asa/ASA-2007-018.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://osvdb.org/38197" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26274" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/29051" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://securityreason.com/securityalert/2960" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/475069/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/24950" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1018472" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2007/2701" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-772" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-01-04 11:52
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple stack consumption vulnerabilities in Asterisk Open Source 1.8.x before 1.8.19.1, 10.x before 10.11.1, and 11.x before 11.1.2; Certified Asterisk 1.8.11 before 1.8.11-cert10; and Asterisk Digiumphones 10.x-digiumphones before 10.11.1-digiumphones allow remote attackers to cause a denial of service (daemon crash) via TCP data using the (1) SIP, (2) HTTP, or (3) XMPP protocol.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEE324AC-5231-43DB-B077-EA1E0145FF5B", "versionEndIncluding": "1.8.19.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6344E43-E8AA-4340-B3A7-72F5D6A5D184", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "4C170C1C-909D-4439-91B5-DB1A9CD150C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EE821BE5-B1D3-4854-A700-3A83E5F15724", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "149C57CA-0B4B-4220-87FC-432418D1C393", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "035595D5-BBEC-4D85-AD7A-A2C932D2BA70", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "6DAF5655-F09F-47F8-AFA6-4B95F77A57F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F8E001D8-0A7B-4FDD-88E3-E124ED32B81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9D5CFFBD-785F-4417-A54A-F3565FD6E736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "D30EF999-92D1-4B19-8E32-1E4B35DE4EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "A67D156B-9C43-444F-ADEC-B21D99D1433C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "893EB152-6444-43DB-8714-9735354C873A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8447EE7-A834-41D7-9204-07BD3752870C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C04F2C9-5672-42F2-B664-A3EE4C954C29", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "33465668-4C91-4619-960A-D26D77853E53", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "CAD08674-0B44-44EA-940B-6812E2D5077D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "EEE87710-A129-43AA-BA08-8001848975FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F582C6E-5DA0-4D72-A40E-66BDBC5CF2B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CEBB8-01B3-4A05-AFE8-37A143C9833E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "522733A7-E89E-4BFD-AC93-D6882636E880", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "2FAC47DD-B613-43E4-B9BF-6120B81D9789", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "86D20CB5-60E8-405E-B387-CF80C7DA5E07", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "71AB5A01-5961-4053-9111-CF32C6473A00", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*", "matchCriteriaId": "77D8E1DC-041F-4B87-AF9A-E0EC4D6A4BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7CCCB892-30CE-4BEF-904E-5D957F94D0EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "F156798F-F2EF-4366-B17E-03165AB437D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "9EFBB9A6-DD1D-436E-919F-74A3E4F40396", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "054E34C8-B6A5-48C7-938E-D3C268E0E8BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*", "matchCriteriaId": "1DCECA72-533A-4A95-AB19-20C5F09A1B01", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*", "matchCriteriaId": "0E2309F8-AFEE-4150-99D1-BA606432ED73", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*", "matchCriteriaId": "7785F282-BFA0-400A-8398-872ACCA4BF37", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1278D3FB-78C6-4F7D-A845-0A93D4F6E2B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "C00A6EFB-A848-46D3-AAD7-FD8140007E42", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "CB6E3972-5C53-4B6D-BFE1-67E1122EA013", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "048617A0-A783-4519-A947-35220D4CD786", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "DD493A41-E686-444C-A34E-412804510F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "87D25FD6-CC3A-4AB0-B7B1-67D07386F99D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C402E9E-09CC-4EFA-AC27-156437B05B22", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C8A41F9C-D2F4-47A9-80CD-2B1BF6B0CB63", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "627FF5B9-E5A8-4DBC-A891-B175011E72A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6146EB2E-BA32-4408-B10B-A711EC39C580", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "1C863324-05AE-4FCA-BD2E-39040A468DCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A85F51E7-0AAE-4F3B-9F90-BD2E31255822", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "315FB0D4-D4A4-4369-BFB8-F2CAEB429015", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "DC74D6C5-F410-4B68-AF92-056B727193A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "B70911F8-A526-4600-8198-03FF4CCB28DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA60A9C9-C2EF-4971-BEFB-FF687DAEF2F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "BAFB22FA-CC24-4AFE-AC83-2D044563F7CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "00F3EB0D-7C63-46B5-BA95-8486B9716C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "00C1BF3B-7593-478D-9AAA-153901C70286", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "82423EC2-FA29-4AF6-86C3-6AC6DFDC4DC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "5F86406A-0936-4A06-88FB-4137A64498EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "672CE4C0-EBD6-470B-937E-810FF1C4CDBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "88DB1105-74D8-4312-9D02-D1E21F2E785C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "404C0557-6229-4D90-BFDD-54AFFCCE6A19", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6D1D26CC-891F-4396-B7D7-30D712829E71", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F25B61EA-F4D1-452A-9D96-B8DFDD719B0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9324AB96-EC99-4F04-A0A9-00F936C86EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "1B8B5E76-4A74-4E88-8A6F-C23538B7642A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "BDB6BBCA-47CE-49B8-9706-AFDE4BE46550", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "8BFF65E2-692B-4C39-88FC-6DED8D9A7258", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "5260E309-9320-4DB8-A918-7D215BF95D2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "60AFF340-A866-4CFE-9334-53B95FD4AA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "74E50309-CD7D-41F7-97DA-A7E451D0796A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "6FD3F8F8-820E-4C29-9F8F-023D1DB999CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "C33A6419-0D00-49D6-9A48-2B633610AAED", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "447E07C9-4A25-418D-B53F-609B78EE4C21", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E8AE686-B618-4B0D-BD27-1F96295E964D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E9751C0A-84F5-4A43-8282-12A9DE559569", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F67E2694-F6F1-482C-91F2-D9FD856EA31B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "5E2D53AA-8D50-445F-9500-2F580F260DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12:*:*:*:*:*:*:*", "matchCriteriaId": "8D9D7D88-D64F-4F54-8C84-6AC45FBD36F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "F67AB282-591C-4ED7-9750-C593A38D5D7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "C9F8F881-2BF7-44AB-8756-54A06801EB11", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "36EFF3C4-4D00-4BC5-94B9-403BB00C6AB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "5E434F10-395E-426E-A988-4CDA504577D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "8880AE7C-3E44-4B76-B500-E93868D4CF5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7C94269D-A271-42AC-A44C-102C814E564B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E7E5B826-D3D5-4D2D-BB4D-2C1BEDE92456", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "5BA564F7-7A69-4805-8C8C-C2EB5E12A6E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "DF6FA464-F9D3-4674-844B-A2B2E2C42A51", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "44722C8B-BB37-4444-A58A-F01D0B3B4DDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "C4FABFDB-D99A-4F83-8FEE-3BFA36BA4061", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "A842E112-8974-4E74-AD56-1DEF5B5DD9F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.15.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D9ACBC01-8A9D-43A5-A825-1CC9670417A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "61E7199F-EACE-431A-8ADD-B96A6FCDBC49", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA7CD0E5-8E69-43B5-A5FF-8B122475CC00", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.16.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "F4BEA1B2-2103-4E25-92A9-DB107D6D4AD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.16.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "2AD9AFFB-F903-43DD-9C1D-4D8E83EA25C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "6F368897-A481-42DD-A8B0-8AD43A5FD68B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6BA8F4AF-26C0-4A69-B489-16E7A56E5123", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FE82D53D-092D-4B36-A979-23E9A5E07A78", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "27365383-72DB-4683-9A67-CF553FF2620A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "46EE63D4-CA9C-4DF4-AF85-B8AC2E3F844A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "91407E03-4E98-4DD9-B584-E5BB74F09B9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "669CC22C-45E5-40AB-9A95-D7DFD694B688", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "54A934AE-AB7C-4D10-8BA2-9C54410C648F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "7A7C5A8E-35E6-4B86-8502-1970031AB987", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "687ED3CE-67C4-410D-8AF4-C769015598F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "30E918CD-89C4-42DA-9709-E50E0A3FA736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "DA57FA15-D0D7-4A97-9C25-6F6566940098", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "A1C45300-A2CF-40E7-AB67-23DC24C31A1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "958081DC-1D77-45CD-A940-C7A1AB42C7BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "298A879D-4F65-4523-A752-D17C4F81B822", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "37AB07BE-54C4-4972-A05F-D1E2CF4363CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBC63564-A84E-463D-8312-DDF1C6B7796F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "62A0906E-B631-4F3A-9ABC-9A43A43220BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "C6314ADA-2849-416D-966E-C01C322EF904", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "8B6CB1DD-614A-4B3D-99AE-9B1341427024", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "CC95B04F-3746-4F1C-8428-A1FA10253E14", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "20819080-E0AB-4879-B4CF-A154D6F7EF6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C6C45753-E2CC-4F7C-B8DA-3D8CF255EA22", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5A080197-D6AA-4FDC-888E-51D1C8251E34", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "1F08D930-D4C1-4C63-875C-171C46AE97C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "1AA43D7D-AEAD-47CB-BFA5-B73004A1A7A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "B5ED5F6F-166D-4610-8939-A33AD45F1ADE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D40002A-564E-425C-BA2A-7C4A8F8DAFD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "521C4DB2-7127-4BA9-94FC-AB0E9E06FE2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "8C905DC1-8AB8-4D83-BB5B-FA4DABC58229", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "ECC74B5D-97A1-46FF-AFA3-5D5E4A0BF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "F2D98C7C-94A8-4348-AF22-04A41FB6F8EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "85D39A99-E9A6-4860-BC61-56CA2FC3238B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "845DA0A4-1983-4E82-99C8-B7FBF47C632E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "5A63FBB7-F1CF-4603-848F-980742D2ED36", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "10B2084F-3AF4-4008-899C-6C1E43715201", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "217C13A5-9F8A-4392-858F-2FC88B03EB0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "6B282462-900C-492E-98DE-65364E62F5E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "687784F0-9ACC-435D-81F9-1E1B0F61010C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "9D7D020C-FE32-408B-BE37-58835FD3D95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "39B7938F-7370-4F67-B0CD-1C14DE2E4E7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC587195-5973-423B-8BF9-3E0B27363B76", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.2:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "E65E012A-49B6-4796-B1FA-A83C9248D0EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "1FBE5780-D503-46D1-BE04-4CB7B662B5DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.6.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "9F4C24B7-22E3-4E56-9B9F-414101B627FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CB19323D-208F-45F9-85F3-BAA5D1BC3AA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "09334CAB-9ADB-49BB-BE83-BBAC6A7A9F47", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "DC6DEEF5-7277-4E38-9233-E3612CD77CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.6.1:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "1813B898-F957-40D7-AF9A-064FB57D5C82", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "75A0D613-3D04-4902-9707-E743F30CF1A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.7.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "C5D07DB0-7C6A-4490-8FD0-DC83568E0421", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "54AB61A7-E143-4BEC-8658-68FF615B007E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "F5552D1C-C05A-4B67-A025-BBD3022C7B9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "9B7F8B72-EEC9-4021-B320-8CB6E83856F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "38A0F946-6A51-4E4D-8E8A-CA6DF222289F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "9C7619B8-B986-4B24-BFFD-956A1A6780FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "21CF339A-A38B-40CE-9811-A6CE77B29025", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "13856847-32A8-401D-A6DC-8DB96AE739FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.9.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "C8E8F4ED-AA7B-4B19-8416-6BC0608C760D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.9.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "B7A900B2-0F3C-450E-8933-BDD5C9627EA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "0992625B-012F-40EA-9A20-6352E633F62B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "E3828876-DDB4-457D-8E50-43A4FF761005", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.10.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "79283554-AF08-44DC-BF98-446C47AA490A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "52B5F73C-174A-4A0B-8D14-EC10779FC884", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "54EBFD0B-686F-477F-8FF2-535F24A3348B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.11.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0961F130-FF8C-41C2-BF2E-9731ED9EB73B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.11.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9789FC49-DE20-4477-B9D5-12CB71F42E58", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F53B8453-F35A-49BE-8129-774BADF71BA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "CCB0C07E-DA2F-4169-848D-C3315CDC1CB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "410C43E6-5912-4C22-A592-7CF94402EEB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D50A355E-1B55-4DD2-8100-EB81AA6FC40E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "9ADF4230-EFEB-45EC-9C96-0262B4A3E459", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "5234531C-F69A-4B94-A480-147734206C5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "321C1066-6800-4488-A7C4-BE91FF738453", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9B51588-50A2-40B2-A007-06F57D38C7AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CDE2B00C-6AC0-4166-8A25-EFC42CE7F737", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "617FC4AF-D152-4EE1-828D-C2A6AD0DFD3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3A3FE6DC-17FD-4CEE-BDFB-9D4685640381", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert:*:*:*:*:*:*", "matchCriteriaId": "C63C46CC-02E2-40AF-8281-F2FB5D89823A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert1:*:*:*:*:*:*", "matchCriteriaId": "71BAF2A7-024D-475A-88C0-0F5ADE3CA286", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert2:*:*:*:*:*:*", "matchCriteriaId": "82F91FE8-C320-466B-AF08-67319A00A2BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert3:*:*:*:*:*:*", "matchCriteriaId": "DCFF0E1C-B455-4C18-8AA1-10408234327B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert4:*:*:*:*:*:*", "matchCriteriaId": "738F68B3-2C5E-4A09-8FF4-2D034ED0C54D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert5:*:*:*:*:*:*", "matchCriteriaId": "6A60C223-AD68-4BFF-91C1-2C7E9F727AA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert6:*:*:*:*:*:*", "matchCriteriaId": "4C313F81-8B38-4845-B1C7-CBB23D7C99B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert7:*:*:*:*:*:*", "matchCriteriaId": "A08731AB-1E43-48B9-AB4C-0B06A34D0807", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert8:*:*:*:*:*:*", "matchCriteriaId": "5A4FBB03-4A60-4A34-855B-74C5079F7769", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert9:*:*:*:*:*:*", "matchCriteriaId": "66E97D3F-3AEB-40EB-87E7-18EC7A84F0CA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "6372EEEA-2759-4B6A-BD03-D84DC956E80E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta1:digiumphones:*:*:*:*:*", "matchCriteriaId": "26DF0C53-9F6A-4233-B163-AEC1F9886387", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta2:digiumphones:*:*:*:*:*", "matchCriteriaId": "79A063D7-553F-486F-9079-D95C8047B05E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc1:digiumphones:*:*:*:*:*", "matchCriteriaId": "B606D854-FC06-4314-AD24-FEEA3796A0AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc2:digiumphones:*:*:*:*:*", "matchCriteriaId": "DEBB0786-D912-48D1-BC63-E0F87E078154", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc3:digiumphones:*:*:*:*:*", "matchCriteriaId": "1C39DD70-1220-4CC6-95B4-CE18CA5787CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "B0005F0B-9C87-4160-9416-A7C136FCD5AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc1:digiumphones:*:*:*:*:*", "matchCriteriaId": "12073B6A-14B1-490B-B267-A68194C68BDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc2:digiumphones:*:*:*:*:*", "matchCriteriaId": "198C92F2-8268-4045-B297-17E0D1F9726E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.1:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "BF86A1A0-D3D7-485A-A46C-7619F74CE821", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "5D3A3C00-EA83-4EF4-8681-DB5616132607", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc1:digiumphones:*:*:*:*:*", "matchCriteriaId": "5FE59F0F-44B0-4940-8368-F360EE610114", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc2:digiumphones:*:*:*:*:*", "matchCriteriaId": "3647F0E3-196F-486B-9BAB-75ED24A055ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc3:digiumphones:*:*:*:*:*", "matchCriteriaId": "1FBC4A5F-FB16-42B2-9689-25F8B3D0F521", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc4:digiumphones:*:*:*:*:*", "matchCriteriaId": "B788D6E2-78E8-4DE1-81F5-40D52263E7F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "51358F60-4D6C-4DBA-86B0-E12C48A67456", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc2:digiumphones:*:*:*:*:*", "matchCriteriaId": "D51C9952-97F4-4326-8F7D-34579D3686AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc3:digiumphones:*:*:*:*:*", "matchCriteriaId": "3711A75C-AF87-4A5C-8B35-1CF834C12D2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "E7FFD09D-21A3-4E98-B1FA-C7A16C243D91", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc1:digiumphones:*:*:*:*:*", "matchCriteriaId": "FAC6591A-BC5A-4CA9-90BC-0B686F74127B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc2:digiumphones:*:*:*:*:*", "matchCriteriaId": "01BAF29D-8679-40F3-AB6C-DA5C3787271C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "B42229C3-B18E-4D50-9B98-202CB1805CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc1:digiumphones:*:*:*:*:*", "matchCriteriaId": "15DF192B-A8D5-4FCC-B469-505A8FA11D00", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc2:digiumphones:*:*:*:*:*", "matchCriteriaId": "D24E01F7-604D-4D05-B698-3BDEF7B69EF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.1:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "A54A74F4-8A6C-4090-88C2-8AB5A606C59B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.2:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "E65E012A-49B6-4796-B1FA-A83C9248D0EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.6.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "9F4C24B7-22E3-4E56-9B9F-414101B627FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.6.1:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "1813B898-F957-40D7-AF9A-064FB57D5C82", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.7.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "C5D07DB0-7C6A-4490-8FD0-DC83568E0421", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple stack consumption vulnerabilities in Asterisk Open Source 1.8.x before 1.8.19.1, 10.x before 10.11.1, and 11.x before 11.1.2; Certified Asterisk 1.8.11 before 1.8.11-cert10; and Asterisk Digiumphones 10.x-digiumphones before 10.11.1-digiumphones allow remote attackers to cause a denial of service (daemon crash) via TCP data using the (1) SIP, (2) HTTP, or (3) XMPP protocol." }, { "lang": "es", "value": "Multiples vulnerabilidades de consumo en Asterisk Open Source v1.8.x anteriores a v1.8.19.1, v10.x anteriores a v10.11.1, y v11.x anteriores a v11.1.2; Certified Asterisk v1.8.11 anteriores a v1.8.11-cert10; y Asterisk Digiumphones 10.x-digiumphones anteriores a 10.11.1-digiumphones permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edde del demonio) a trav\u00e9s de datos TCP usando los protocolos (1) SIP, (2) HTTP, o (3) XMPP." } ], "id": "CVE-2012-5976", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-01-04T11:52:14.633", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2012-014" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2013/dsa-2605" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2012-014" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2013/dsa-2605" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-02-09 11:59
Modified
2025-04-12 10:46
Severity ?
Summary
Asterisk Open Source 12.x before 12.8.1 and 13.x before 13.1.1, when using the PJSIP channel driver, does not properly reclaim RTP ports, which allows remote authenticated users to cause a denial of service (file descriptor consumption) via an SDP offer containing only incompatible codecs.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digium | asterisk | 12.0.0 | |
digium | asterisk | 12.1.0 | |
digium | asterisk | 12.1.0 | |
digium | asterisk | 12.1.0 | |
digium | asterisk | 12.1.0 | |
digium | asterisk | 12.1.1 | |
digium | asterisk | 12.2.0 | |
digium | asterisk | 12.2.0 | |
digium | asterisk | 12.2.0 | |
digium | asterisk | 12.2.0 | |
digium | asterisk | 12.3.0 | |
digium | asterisk | 12.3.0 | |
digium | asterisk | 12.3.0 | |
digium | asterisk | 12.3.1 | |
digium | asterisk | 12.3.2 | |
digium | asterisk | 12.4.0 | |
digium | asterisk | 12.4.0 | |
digium | asterisk | 12.5.0 | |
digium | asterisk | 12.5.0 | |
digium | asterisk | 12.6.0 | |
digium | asterisk | 12.6.0 | |
digium | asterisk | 12.7.0 | |
digium | asterisk | 12.7.0 | |
digium | asterisk | 12.7.0 | |
digium | asterisk | 12.8.0 | |
digium | asterisk | 12.8.0 | |
digium | asterisk | 12.8.0 | |
digium | asterisk | 12.8.1 | |
digium | asterisk | 13.0.0 | |
digium | asterisk | 13.1.0 | |
digium | asterisk | 13.1.0 | |
digium | asterisk | 13.1.0 | |
digium | asterisk | 13.2.0 | |
digium | asterisk | 13.2.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B446105E-6C8E-495A-BF83-A33CB33485A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:-:*:*:*:*:*:*", "matchCriteriaId": "F3DE062D-4E87-4691-A664-D9E7C02036EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3B4D6D24-A718-4962-AD4E-F19AFB03BFF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "BE2F0D0D-761C-4338-93F0-506E94E57000", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "3D38DFCA-E357-4A28-8F03-FDADF40A5185", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "B3CD4A85-26FB-4AE5-9CB7-4DF38DF32482", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F42C9442-9EBC-4CA5-AB1C-BA0662C27BDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "71762B58-A08B-405B-9596-6D15CF4A95D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "EA48C05A-E898-42EE-A699-94BBD66E5E0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "EDCB78F8-AAC8-44B1-BDF4-C73BC8951EC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D92FFF6-E7B2-4210-A652-79AC6B74002C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "DB5E92FB-9CF8-461E-A665-3407D265DF17", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "536F6C10-3165-40F7-931A-23765AB87555", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "B8DD16DF-C47C-41CF-8CDE-C365103262A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "43C06F98-62F4-4008-A463-2791BEDF6DED", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "133288EC-8A78-4C9D-BF94-9900CD3D2260", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B2E54998-B257-478E-9E52-2BB4F4CD6429", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "5FD4498A-72BD-40EB-A332-DE10C87C1015", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "71961599-009C-42F4-AA26-9B16C39F3CBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B98A2EA6-DCC6-4F8B-B132-6692AED16CF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "672EDC0E-D70A-4BB0-B7FE-5D422C737862", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.7.0:*:*:*:lts:*:*:*", "matchCriteriaId": "C779E0D4-0375-4BE8-9667-A32C68B66D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "8E9E50F8-0123-4C9E-88E1-5DCE08770B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F7C605A3-8517-4215-9AD3-980D587B22DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "44746060-BC6F-4E6D-BA81-61623B2D27FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "47548ADE-255A-4355-BD06-1FEF134C1620", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "ABCFC4D9-8054-4F42-BE7E-5092F6648F95", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "84A7DBB5-999C-4AE8-BC5D-F0C5F77957DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "7B635C21-C193-43AF-A139-98604F324ABF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "58C0FF1B-6188-4181-A139-1806328762BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "890EBB8C-989B-4344-AC03-62B399076008", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "BD4AAECB-A2BC-45BA-BC63-E51C1FE6C334", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "136D6508-660E-410D-829A-7DD452BF8819", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "AEC2B3AA-EB24-4259-BED1-5DBC102FE9C1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Asterisk Open Source 12.x before 12.8.1 and 13.x before 13.1.1, when using the PJSIP channel driver, does not properly reclaim RTP ports, which allows remote authenticated users to cause a denial of service (file descriptor consumption) via an SDP offer containing only incompatible codecs." }, { "lang": "es", "value": "Asterisk Open Source 12.x anterior a 12.8.1 y 13.x anterior a 13.1.1, cuando utiliza el controlador de canales PJSIP, no recupera correctamente los puertos RTP, lo que permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (consumo del descriptor de ficheros) a trav\u00e9s de una oferta SDP que contiene solamente codecs incompatibles." } ], "id": "CVE-2015-1558", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-02-09T11:59:00.067", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2015-001.html" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2015/Jan/116" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/534573/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1031661" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2015-001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2015/Jan/116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/534573/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1031661" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-07-30 14:15
Modified
2024-11-21 06:06
Severity ?
Summary
An issue was discovered in PJSIP in Asterisk before 16.19.1 and before 18.5.1. To exploit, a re-INVITE without SDP must be received after Asterisk has sent a BYE request.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:16.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "4793E23F-97F7-4F87-B521-1718AA6FAD06", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:16.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "E01BD9F9-857A-4114-80D6-9F43B230EF3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:16.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "00B876D8-5BE7-4F40-9692-4C7C6EE49611", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:18.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "78681A97-2B41-494E-AA7A-3BB953E8497B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:18.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "54266F33-D604-491F-9891-C9D8A1B68135", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:18.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CC9EFF-8916-46E6-97ED-39035541E350", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in PJSIP in Asterisk before 16.19.1 and before 18.5.1. To exploit, a re-INVITE without SDP must be received after Asterisk has sent a BYE request." }, { "lang": "es", "value": "Se ha detectado un problema en PJSIP en Asterisk versiones anteriores a 16.19.1 y versiones anteriores a 18.5.1. Para explotarlo, se debe recibir un re-INVITE sin SDP despu\u00e9s de que Asterisk haya enviado una petici\u00f3n BYE" } ], "id": "CVE-2021-31878", "lastModified": "2024-11-21T06:06:24.867", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-30T14:15:16.690", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2021-007.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/163638/Asterisk-Project-Security-Advisory-AST-2021-007.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Jul/48" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://downloads.digium.com/pub/security/AST-2021-007.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-29381" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2021-007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/163638/Asterisk-Project-Security-Advisory-AST-2021-007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Jul/48" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://downloads.digium.com/pub/security/AST-2021-007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-29381" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-617" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-02-22 00:29
Modified
2024-11-21 04:11
Severity ?
Summary
An issue was discovered in res_http_websocket.c in Asterisk 15.x through 15.2.1. If the HTTP server is enabled (default is disabled), WebSocket payloads of size 0 are mishandled (with a busy loop).
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://downloads.digium.com/pub/security/AST-2018-006.html | Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/103120 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1040419 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://issues.asterisk.org/jira/browse/ASTERISK-27658 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://downloads.digium.com/pub/security/AST-2018-006.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/103120 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040419 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://issues.asterisk.org/jira/browse/ASTERISK-27658 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digium | asterisk | 15.0.0 | |
digium | asterisk | 15.0.0 | |
digium | asterisk | 15.1.0 | |
digium | asterisk | 15.1.0 | |
digium | asterisk | 15.1.0 | |
digium | asterisk | 15.1.1 | |
digium | asterisk | 15.1.2 | |
digium | asterisk | 15.1.3 | |
digium | asterisk | 15.1.4 | |
digium | asterisk | 15.1.5 | |
digium | asterisk | 15.2.0 | |
digium | asterisk | 15.2.0 | |
digium | asterisk | 15.2.0 | |
digium | asterisk | 15.2.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:15.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9B067A37-7101-48F8-B42A-50A0F59154F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "A0D20EE5-E2C7-4CD3-9932-33A0C27465C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "C42CFBDA-8B84-4A8F-8C1E-207C48138DFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "8B0C2D39-0D85-4655-968F-9B6F48C4DE18", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "25307605-D767-4253-BEE7-928B89DA260A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E057E8B7-B1E9-4A62-9C7D-14F36435F16D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "17F0D6D8-AE61-4A0C-B8D6-D91DECB407D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "DA48CBAB-AD3D-4D2A-9932-D21DB10F0884", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "A069FD52-C61C-49A4-A863-0FDB21B031B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "491EE070-6913-4AB4-BDB1-CFDCAEFEEFD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "82F3B56D-E148-4E63-BF7E-F9E8967A24E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "72541FC4-4CC7-435F-B51D-4754E873EBDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "68A2AA7A-C598-4F0A-BF83-C804566C5B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "43A3B57E-1E68-48CF-902E-4C90FC738B5B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in res_http_websocket.c in Asterisk 15.x through 15.2.1. If the HTTP server is enabled (default is disabled), WebSocket payloads of size 0 are mishandled (with a busy loop)." }, { "lang": "es", "value": "Se ha descubierto un problema en res_http_websocket.c en Asterisk hasta la versi\u00f3n 15.2.1. Si el servidor HTTP est\u00e1 habilitado (est\u00e1 deshabilitado por defecto), las cargas \u00fatiles de WebSocket de tama\u00f1o 0 se gestionan de forma incorrecta (con un bucle ocupado)." } ], "id": "CVE-2018-7287", "lastModified": "2024-11-21T04:11:56.747", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-22T00:29:01.173", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.digium.com/pub/security/AST-2018-006.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103120" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040419" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27658" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.digium.com/pub/security/AST-2018-006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040419" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27658" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-754" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-08-30 07:15
Modified
2024-11-21 06:34
Severity ?
Summary
res_pjsip_t38 in Sangoma Asterisk 16.x before 16.16.2, 17.x before 17.9.3, and 18.x before 18.2.2, and Certified Asterisk before 16.8-cert7, allows an attacker to trigger a crash by sending an m=image line and zero port in a response to a T.38 re-invite initiated by Asterisk. This is a re-occurrence of the CVE-2019-15297 symptoms but not for exactly the same reason. The crash occurs because there is an append operation relative to the active topology, but this should instead be a replace operation.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://downloads.asterisk.org/pub/security/AST-2021-006.html | Vendor Advisory | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://www.debian.org/security/2022/dsa-5285 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://downloads.asterisk.org/pub/security/AST-2021-006.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2022/dsa-5285 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
asterisk | certified_asterisk | 16.8.0 | |
digium | asterisk | * | |
digium | asterisk | * | |
digium | asterisk | * | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
debian | debian_linux | 11.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:-:*:*:*:*:*:*", "matchCriteriaId": "335EF1B5-AD89-48E2-AB2C-BF376BC36F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert1:*:*:*:*:*:*", "matchCriteriaId": "E64BCD44-2298-4710-9CC3-DF82E6A8DF94", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert2:*:*:*:*:*:*", "matchCriteriaId": "A35C117A-6EFB-42EB-AD2A-EA7866606927", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert3:*:*:*:*:*:*", "matchCriteriaId": "40003CBE-792F-4875-9E60-6F1CE0BBAA8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert4:*:*:*:*:*:*", "matchCriteriaId": "46A7AA7B-13F2-496A-99ED-1CC13234E8CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert5:*:*:*:*:*:*", "matchCriteriaId": "147663CB-B48D-4D89-96BF-F92FF96F347F", "vulnerable": true }, { "criteria": "cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert6:*:*:*:*:*:*", "matchCriteriaId": "27DBBC83-930A-4ECE-8C1E-47481D881B0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6D5A9E8-239F-492C-95AD-7CF2AB964D87", "versionEndExcluding": "16.16.2", "versionStartIncluding": "16.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CA36883-D695-47A1-8CA7-2F128BFA194D", "versionEndExcluding": "17.9.3", "versionStartIncluding": "17.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DEE180D-A041-42AB-AE5E-DDBD9CF0AACF", "versionEndExcluding": "18.2.2", "versionStartIncluding": "18.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "res_pjsip_t38 in Sangoma Asterisk 16.x before 16.16.2, 17.x before 17.9.3, and 18.x before 18.2.2, and Certified Asterisk before 16.8-cert7, allows an attacker to trigger a crash by sending an m=image line and zero port in a response to a T.38 re-invite initiated by Asterisk. This is a re-occurrence of the CVE-2019-15297 symptoms but not for exactly the same reason. The crash occurs because there is an append operation relative to the active topology, but this should instead be a replace operation." }, { "lang": "es", "value": "La funci\u00f3n res_pjsip_t38 en Sangoma Asterisk versiones 16.x anteriores a 16.16.2, 17.x anteriores a 17.9.3, y 18.x anteriores a 18.2.2, y Certified Asterisk anteriores a 16.8-cert7, permite a un atacante desencadenar un fallo mediante el env\u00edo de una l\u00ednea m=image y un puerto cero en una respuesta a una Re invitaci\u00f3n T.38 iniciada por Asterisk. Se trata de una reaparici\u00f3n de los s\u00edntomas de la CVE-2019-15297 pero no exactamente por el mismo motivo. El fallo es producido porque se presenta una operaci\u00f3n de append relativa a la topolog\u00eda activa, pero deber\u00eda ser en cambio una operaci\u00f3n de replace" } ], "id": "CVE-2021-46837", "lastModified": "2024-11-21T06:34:47.440", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-30T07:15:07.417", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/AST-2021-006.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/AST-2021-006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5285" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-04-10 15:00
Modified
2025-04-12 10:46
Severity ?
Summary
Asterisk Open Source 1.8 before 1.8.32.3, 11.x before 11.17.1, 12.x before 12.8.2, and 13.x before 13.3.2 and Certified Asterisk 1.8.28 before 1.8.28-cert5, 11.6 before 11.6-cert11, and 13.1 before 13.1-cert2, when registering a SIP TLS device, does not properly handle a null byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6344E43-E8AA-4340-B3A7-72F5D6A5D184", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "4C170C1C-909D-4439-91B5-DB1A9CD150C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EE821BE5-B1D3-4854-A700-3A83E5F15724", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "149C57CA-0B4B-4220-87FC-432418D1C393", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "035595D5-BBEC-4D85-AD7A-A2C932D2BA70", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "6DAF5655-F09F-47F8-AFA6-4B95F77A57F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F8E001D8-0A7B-4FDD-88E3-E124ED32B81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9D5CFFBD-785F-4417-A54A-F3565FD6E736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "D30EF999-92D1-4B19-8E32-1E4B35DE4EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "A67D156B-9C43-444F-ADEC-B21D99D1433C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "893EB152-6444-43DB-8714-9735354C873A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8447EE7-A834-41D7-9204-07BD3752870C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C04F2C9-5672-42F2-B664-A3EE4C954C29", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "33465668-4C91-4619-960A-D26D77853E53", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "CAD08674-0B44-44EA-940B-6812E2D5077D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "EEE87710-A129-43AA-BA08-8001848975FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F582C6E-5DA0-4D72-A40E-66BDBC5CF2B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CEBB8-01B3-4A05-AFE8-37A143C9833E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "522733A7-E89E-4BFD-AC93-D6882636E880", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "2FAC47DD-B613-43E4-B9BF-6120B81D9789", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "86D20CB5-60E8-405E-B387-CF80C7DA5E07", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "71AB5A01-5961-4053-9111-CF32C6473A00", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*", "matchCriteriaId": "77D8E1DC-041F-4B87-AF9A-E0EC4D6A4BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7CCCB892-30CE-4BEF-904E-5D957F94D0EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "F156798F-F2EF-4366-B17E-03165AB437D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "9EFBB9A6-DD1D-436E-919F-74A3E4F40396", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "5260E309-9320-4DB8-A918-7D215BF95D2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:-:*:*:*:*:*:*", "matchCriteriaId": "58F4BFC9-E02A-4121-8D34-99022AB8B45A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "60AFF340-A866-4CFE-9334-53B95FD4AA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "74E50309-CD7D-41F7-97DA-A7E451D0796A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "6FD3F8F8-820E-4C29-9F8F-023D1DB999CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "C33A6419-0D00-49D6-9A48-2B633610AAED", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "447E07C9-4A25-418D-B53F-609B78EE4C21", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E8AE686-B618-4B0D-BD27-1F96295E964D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:-:*:*:*:*:*:*", "matchCriteriaId": "9C806F87-C897-48E4-8533-A4EBC6B77078", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:patch:*:*:*:*:*:*", "matchCriteriaId": "08B8C143-93FF-44DD-8F61-6F4FEE977371", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E9751C0A-84F5-4A43-8282-12A9DE559569", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F67E2694-F6F1-482C-91F2-D9FD856EA31B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "5E2D53AA-8D50-445F-9500-2F580F260DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.1:-:*:*:*:*:*:*", "matchCriteriaId": "8859F234-5066-40DD-862C-0F3CCA98AFB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.1:patch:*:*:*:*:*:*", "matchCriteriaId": "75962F03-EC19-4920-9FA7-2D422E6E83F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12:*:*:*:*:*:*:*", "matchCriteriaId": "8D9D7D88-D64F-4F54-8C84-6AC45FBD36F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "F67AB282-591C-4ED7-9750-C593A38D5D7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:-:*:*:*:*:*:*", "matchCriteriaId": "B5D0BB0E-1BB0-4F31-9C5D-DC1A069E52DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "C9F8F881-2BF7-44AB-8756-54A06801EB11", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "36EFF3C4-4D00-4BC5-94B9-403BB00C6AB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "5E434F10-395E-426E-A988-4CDA504577D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "33FE3DCE-74B5-49A4-BC18-34B22CA83947", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "FF2E25F3-053D-4F7D-A35D-706A401CCAA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "8880AE7C-3E44-4B76-B500-E93868D4CF5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7C94269D-A271-42AC-A44C-102C814E564B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E7E5B826-D3D5-4D2D-BB4D-2C1BEDE92456", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "5BA564F7-7A69-4805-8C8C-C2EB5E12A6E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.0:-:*:*:*:*:*:*", "matchCriteriaId": "2A153336-10C4-4C42-AC66-AC1351887EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.0:patch:*:*:*:*:*:*", "matchCriteriaId": "0C2FF4E9-2513-4022-AF80-6F44A2287D6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "DF6FA464-F9D3-4674-844B-A2B2E2C42A51", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "44722C8B-BB37-4444-A58A-F01D0B3B4DDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "C4FABFDB-D99A-4F83-8FEE-3BFA36BA4061", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.1:-:*:*:*:*:*:*", "matchCriteriaId": "43E00618-19F6-4828-818A-95C9106097B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.1:patch:*:*:*:*:*:*", "matchCriteriaId": "CEC4F4AE-7BD8-437F-8838-FE564BCB7FA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "A842E112-8974-4E74-AD56-1DEF5B5DD9F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.15.0:-:*:*:*:*:*:*", "matchCriteriaId": "2BC3B463-6B2C-42AF-BE13-50B7D63E7F05", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.15.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D9ACBC01-8A9D-43A5-A825-1CC9670417A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "61E7199F-EACE-431A-8ADD-B96A6FCDBC49", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA7CD0E5-8E69-43B5-A5FF-8B122475CC00", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.16.0:-:*:*:*:*:*:*", "matchCriteriaId": "2799111C-06DB-4979-8F81-A8C09D53E5F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.16.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "F4BEA1B2-2103-4E25-92A9-DB107D6D4AD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.16.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "2AD9AFFB-F903-43DD-9C1D-4D8E83EA25C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "6F368897-A481-42DD-A8B0-8AD43A5FD68B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:-:*:*:*:*:*:*", "matchCriteriaId": "4F3C35F1-CBF2-4F77-AC19-574DEF2652A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:patch:*:*:*:*:*:*", "matchCriteriaId": "75EA94FD-D16A-49BC-A418-36EFC187EC7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6BA8F4AF-26C0-4A69-B489-16E7A56E5123", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FE82D53D-092D-4B36-A979-23E9A5E07A78", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "27365383-72DB-4683-9A67-CF553FF2620A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "46EE63D4-CA9C-4DF4-AF85-B8AC2E3F844A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.0:-:*:*:*:*:*:*", "matchCriteriaId": "A14FC2A1-29D5-49FE-92A9-D61833BF1C95", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "91407E03-4E98-4DD9-B584-E5BB74F09B9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "669CC22C-45E5-40AB-9A95-D7DFD694B688", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "80A38E0C-45D9-4353-8426-87A4CFA371DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:-:*:*:*:*:*:*", "matchCriteriaId": "5E3C5C1E-67E9-401A-BA52-FCB32CA4473C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "54A934AE-AB7C-4D10-8BA2-9C54410C648F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "7A7C5A8E-35E6-4B86-8502-1970031AB987", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "1FA4C14B-A01C-4CFE-8985-317ACCDAD209", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:-:*:*:*:*:*:*", "matchCriteriaId": "501F5764-BBC2-426A-AF01-7FB477850073", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:patch:*:*:*:*:*:*", "matchCriteriaId": "FDB35CE5-4EDB-4949-A5E4-1BD721CCA469", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "619704FF-2F0C-47E8-A340-58135CEE6B89", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E412E336-871A-4CAC-97E5-FB203BB9349D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.1:-:*:*:*:*:*:*", "matchCriteriaId": "82ED9CD2-504E-4D7B-B242-2511A7730776", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.1:patch:*:*:*:*:*:*", "matchCriteriaId": "EF6E50F5-605A-4D2B-B55D-8AB251532E8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.2:-:*:*:*:*:*:*", "matchCriteriaId": "F6C796AE-95EE-4EAB-959C-1C1353C565A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.2:patch:*:*:*:*:*:*", "matchCriteriaId": "EEAF3B2E-E520-4F43-ACC5-0F01A6247199", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.21.0:-:*:*:*:*:*:*", "matchCriteriaId": "085D4102-E2E8-496C-85B7-714FD3639BE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.21.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "FC1A0E66-63F4-4BD0-8C9A-3D23A116EE08", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.21.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "79963FF0-5ED6-41B6-8E60-146BD7879518", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.22.0:-:*:*:*:*:*:*", "matchCriteriaId": "E0ABBB2C-19EC-4D6C-A1EA-AEF0ABA4123D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.22.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0787BC7B-9464-4AAA-896B-C028ECF8E397", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.22.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "84C0FBC8-9CD1-4135-94C7-BE90A7C94625", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:-:*:*:*:*:*:*", "matchCriteriaId": "981F3994-392D-47DB-97DA-AC15BA070A36", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:patch:*:*:*:*:*:*", "matchCriteriaId": "94691EE6-266F-46CE-B388-0289EB39D91A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "FD3948A1-B5A6-4702-9187-A7720E81B7F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "BC097BB6-02E9-4F48-98CB-B5F31B41009C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C2FD962-B1D5-41E5-884E-0C3F7F9DACE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.24.0:-:*:*:*:*:*:*", "matchCriteriaId": "096E966A-878B-426F-AB40-BB476B17B969", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.24.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "852DAF2A-86F3-4D05-91DC-6A2FBC214736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.24.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "7D721486-3043-4380-A73C-44B4DD0E34C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "1F29E2EE-B6E8-4E55-84A8-3BD0658387EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.25.0:-:*:*:*:*:*:*", "matchCriteriaId": "837BF2BD-814F-4503-91DF-EE16B5A4921D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.25.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "15FCDDB3-62D8-446C-B57C-F3BBFBD13491", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.25.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "03512BDE-E441-46F6-88B7-16A2468CA199", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.26.0:-:*:*:*:*:*:*", "matchCriteriaId": "902CAF9D-9D02-47FA-AE2E-EC1268A32BA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.26.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "80AD87B5-B796-4C44-8A6D-0B22AA2903CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.26.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D87B2B3-E40B-4BF7-91E6-3B3F9CA28719", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "2575F7A4-E1F1-4836-A467-076EDD8484B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.27.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CBDFAFA3-A52F-4FC8-BA51-FE52D5F57DD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.27.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6085E437-87B8-4355-BDC0-A14EA4F52695", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "5C44D1ED-2435-4042-BF15-3D752BE0C661", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.28.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "23E4CE5C-375C-4ECB-A4D9-A5A6805E5FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "236D459B-ED50-4A2F-B463-D2F9DD1C7E8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.28.2:*:*:*:*:*:*:*", "matchCriteriaId": "E9EEB00A-68B0-4CDE-B625-AB83B1D6D2F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.32.0:*:*:*:lts:*:*:*", "matchCriteriaId": "72195459-404F-423E-A78C-DE2A728AFDA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F53B8453-F35A-49BE-8129-774BADF71BA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "CCB0C07E-DA2F-4169-848D-C3315CDC1CB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "410C43E6-5912-4C22-A592-7CF94402EEB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D50A355E-1B55-4DD2-8100-EB81AA6FC40E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "9ADF4230-EFEB-45EC-9C96-0262B4A3E459", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "5234531C-F69A-4B94-A480-147734206C5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "321C1066-6800-4488-A7C4-BE91FF738453", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9B51588-50A2-40B2-A007-06F57D38C7AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CDE2B00C-6AC0-4166-8A25-EFC42CE7F737", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "9FD404B4-2B0A-4D7A-8CF6-E2C6B4BACBB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "617FC4AF-D152-4EE1-828D-C2A6AD0DFD3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3A3FE6DC-17FD-4CEE-BDFB-9D4685640381", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8CEEB6C2-0A6D-4434-8446-CB8605CD3B14", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "1548C574-CD51-49F6-91B1-B06C504000E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D56C2C11-4B42-43AB-9DAE-61C15D107160", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "69F2DED4-39F5-44C8-BEA3-22692D28C631", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "AD172E70-238B-4B01-A922-8021B5627092", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "C689A32B-E87D-492F-B3F6-7B80DFA049C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5FB3863D-7F46-4C4A-9E6B-C255CDF0D953", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "7239304D-C383-4F26-BB08-65ADD2380015", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "1AC153C2-258E-4EE6-845F-8E8C68AA242D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "1453BB31-D674-4A05-AB2A-2502D127C3E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "229B7982-9775-42AA-B8F5-FE920CCAA497", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "326845DF-2DB2-406B-BE0F-877384DAACFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.5.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E0FC2D46-FD1B-421F-8773-BB41B1E9A831", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "8788AF7B-CBB6-4D9D-A748-486787935A96", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "868865A1-E074-4DB0-A119-D24C5C53FEF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "1794440C-7068-4673-9142-6221B8A39E5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "C5CF286B-3377-4AE9-A7B9-8535641D639A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "50EC8D9D-3483-4080-8000-496343BC8BFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6695F632-6AC4-400F-B513-280304ABC1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "A3423C40-240A-4237-8B0F-A4B4ED421C3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:-:*:*:*:*:*:*", "matchCriteriaId": "03298D9F-CFB8-48F9-BD0C-8A0BEB0760C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "87FCBE6A-C1CD-48EF-A435-4CEADD46C917", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "42E0E639-70A2-41EE-9B34-A9223D1958AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "32E84D64-0CB8-46BF-BD3F-8CA2E0CE4C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A70420A8-8571-4528-98E1-72BE00270C6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "A276363F-F897-4E6D-9D55-5F5AA73DEE26", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "38230656-6242-4D24-AA67-F42A6FA2FC7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "20ED9FC3-5E56-4AE7-903F-267CAE7F2CA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "84F88075-9935-45BF-88B7-21ACE8AAB314", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "DB16D9D6-A2F6-4C4B-B364-1B63B1FFB5F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "283793E4-0AE8-48D9-ABCF-70E44FE55C4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "A0F79D5F-EB28-417A-86DF-053D6EDBA161", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.10.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "4A036F91-70E0-4E97-9896-EEE97BE3C20E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "C4EABFC3-24FA-4441-9F2B-650D90AE5CC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.11.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3DA61A22-3DD0-46A3-8C13-F25F4F03FD35", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "2026FD07-103C-4691-AFA4-88C490382F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.12.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "791700CD-E007-489E-9BC6-37025CAA8144", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "4061B4C7-8315-450C-866A-C4F3A6BCB1A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.13.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "C6EA7154-7F08-4E43-9270-E617632230AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.14.0:*:*:*:lts:*:*:*", "matchCriteriaId": "4149F36C-D455-415F-93D7-F92EEE41419D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.14.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "2DC51129-8F38-4505-90FB-4FFDED45BABF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.14.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "4CA571E0-B513-47AA-95BE-EB4DD2AA91E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A62DFFE-637B-4911-B3B4-6DA4053CBDBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "9F7C5D35-A6AE-4A2E-98C5-CB58FF22AF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "D23CE302-AC62-468C-96B3-1EF430825170", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B446105E-6C8E-495A-BF83-A33CB33485A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:-:*:*:*:*:*:*", "matchCriteriaId": "F3DE062D-4E87-4691-A664-D9E7C02036EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3B4D6D24-A718-4962-AD4E-F19AFB03BFF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "BE2F0D0D-761C-4338-93F0-506E94E57000", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "3D38DFCA-E357-4A28-8F03-FDADF40A5185", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "B3CD4A85-26FB-4AE5-9CB7-4DF38DF32482", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F42C9442-9EBC-4CA5-AB1C-BA0662C27BDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "71762B58-A08B-405B-9596-6D15CF4A95D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "EA48C05A-E898-42EE-A699-94BBD66E5E0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "EDCB78F8-AAC8-44B1-BDF4-C73BC8951EC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D92FFF6-E7B2-4210-A652-79AC6B74002C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "DB5E92FB-9CF8-461E-A665-3407D265DF17", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "536F6C10-3165-40F7-931A-23765AB87555", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "B8DD16DF-C47C-41CF-8CDE-C365103262A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "43C06F98-62F4-4008-A463-2791BEDF6DED", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "133288EC-8A78-4C9D-BF94-9900CD3D2260", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B2E54998-B257-478E-9E52-2BB4F4CD6429", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "5FD4498A-72BD-40EB-A332-DE10C87C1015", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "71961599-009C-42F4-AA26-9B16C39F3CBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B98A2EA6-DCC6-4F8B-B132-6692AED16CF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "672EDC0E-D70A-4BB0-B7FE-5D422C737862", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.7.0:*:*:*:lts:*:*:*", "matchCriteriaId": "C779E0D4-0375-4BE8-9667-A32C68B66D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.7.0:*:*:*:standard:*:*:*", "matchCriteriaId": "6DEF3D58-73E0-402A-A15F-05CA72B5B288", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "8E9E50F8-0123-4C9E-88E1-5DCE08770B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F7C605A3-8517-4215-9AD3-980D587B22DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "866815AE-D1FE-460C-A3BC-70C251655C1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "44746060-BC6F-4E6D-BA81-61623B2D27FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "47548ADE-255A-4355-BD06-1FEF134C1620", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "ABCFC4D9-8054-4F42-BE7E-5092F6648F95", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "84A7DBB5-999C-4AE8-BC5D-F0C5F77957DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.0:*:*:*:lts:*:*:*", "matchCriteriaId": "E7D1238A-A8D2-485E-81FD-46038A883EC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FB2C4E1E-6B90-4DCC-BC09-7D19FBA65C3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "58C0FF1B-6188-4181-A139-1806328762BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "890EBB8C-989B-4344-AC03-62B399076008", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "BD4AAECB-A2BC-45BA-BC63-E51C1FE6C334", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "136D6508-660E-410D-829A-7DD452BF8819", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "AEC2B3AA-EB24-4259-BED1-5DBC102FE9C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5BA542E-4667-4D9E-BDAE-FED6CA63F99D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83C8E7EC-0D4C-40E2-9EE1-4AB5F03464D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "93F2B062-09B4-44F1-87E4-6104B757B557", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "F2877B09-B0B9-4AD4-906A-D40E25DDC4BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "11AAE0EA-D7EB-4341-A412-FBCDC99565A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "37F93124-25D9-44ED-B4AB-1B3552FCAB09", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "E4CB22F6-9F63-427C-B2D2-7ABB9B4F7694", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "758AB27B-7C40-41ED-9FC3-BE3D682EE48A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "07D3186A-CD6F-432A-8653-4CFBA37B9864", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "746FB2E6-EF66-4EF3-946C-111FB7728EBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "91D933DB-06F7-45A4-A517-BFAEC82DDB7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "3AAB500F-8F0D-4534-B659-C495D1799913", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "5F5C5156-CC72-4AB5-A927-E874199EBD8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.1.0:-:*:*:*:*:*:*", "matchCriteriaId": "AB912D4D-6BA4-4AEF-BBFD-EABFED240015", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "68C78C16-3807-4272-9B46-9D9AF5150879", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.2.0:-:*:*:*:*:*:*", "matchCriteriaId": "02E13D3A-B37B-4215-82E0-3FCE5E35B00A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "BE0F93D1-7602-47AC-9ACE-AA850D7DFD23", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.3.0:-:*:*:*:*:*:*", "matchCriteriaId": "956BCED3-1818-4673-A0F4-E7F03F366D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0B58ACCC-0255-46B1-8517-EDCD85AA0F35", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "A921B590-57C2-4E0A-B28B-D0E48F5E1B58", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.3.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "70F0AE7B-9E53-4E3B-AA9E-EAF7C4C31E1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.4.0:-:*:*:*:*:*:*", "matchCriteriaId": "5DE6F187-7236-4622-BD62-1E5F0742B41B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "F70DDB6D-BE16-4375-87AE-E5E2B5862D17", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.4.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6910E07C-3ACA-414F-B468-13E4BF9BE938", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.4.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "837A07D7-C2FD-4077-A0AD-AF2147E04B84", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.5.0:-:*:*:*:*:*:*", "matchCriteriaId": "B2A99209-E8C5-44E6-A8DA-7FC07FBA6D87", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "18985B4A-4C54-4EC6-9274-15E7DCFEC94D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.6.0:-:*:*:*:*:*:*", "matchCriteriaId": "48AE70AD-85BE-44DE-BC75-1690C27821B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "804F861A-81E1-45C5-A7D3-0E73770AC155", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "0AE503BD-F9BD-4396-B27D-184AE06F594D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9CD9A213-27F7-410E-97B1-E7405B4FCECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.7.0:-:*:*:*:*:*:*", "matchCriteriaId": "10FFDE4F-0B30-43C3-9475-80259D5E9055", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5F30E2AB-B354-4583-9D76-9DF1727407A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "DBDFE57E-EEBF-4722-B6D0-147F72018DE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.8.0:-:*:*:*:*:*:*", "matchCriteriaId": "902A2600-49A7-4013-A621-9EE94F1E8435", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7021D54A-D443-492A-AE8C-62F2B85A1F37", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "B003CB5A-A95A-481F-B762-79C476829D81", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "84C8BB88-FBE3-4C82-9D53-E34AA7B6A73E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "F8037EB0-42FA-45BA-9E8E-D279432EC4CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "E374559C-E550-4BB9-9682-9C4535EAE9A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.9.0:-:*:*:*:*:*:*", "matchCriteriaId": "FFFB7E8B-C963-4ACB-AE37-9E4938A5462E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "DF83EAD3-3CC1-4C1B-AAB8-0FE03BB67EC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.9.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E3F75AF0-A4E0-425E-B707-ED1F58C9CC83", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.9.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "745EC4D8-5E19-48C8-8609-11A74DC18266", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.10.0:-:*:*:*:*:*:*", "matchCriteriaId": "F1871DC4-AA58-4C04-9D6A-4FF383C56405", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8560DBD-A70E-4033-AE2E-96DA373AB425", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.10.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E08ECE50-3A53-45C1-8BEA-8B9E024E22F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.10.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "59C2E58B-EEB3-4E8D-940C-2DF846923B19", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.10.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "D40F2ADC-6F79-410F-9063-1354C15F0D8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert:*:*:*:*:*:*", "matchCriteriaId": "C63C46CC-02E2-40AF-8281-F2FB5D89823A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert1:*:*:*:*:*:*", "matchCriteriaId": "71BAF2A7-024D-475A-88C0-0F5ADE3CA286", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert10:*:*:*:*:*:*", "matchCriteriaId": "27E0B1E7-1DA3-47C4-AA2A-54D4C2C48A8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert2:*:*:*:*:*:*", "matchCriteriaId": "82F91FE8-C320-466B-AF08-67319A00A2BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert3:*:*:*:*:*:*", "matchCriteriaId": "DCFF0E1C-B455-4C18-8AA1-10408234327B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert4:*:*:*:*:*:*", "matchCriteriaId": "738F68B3-2C5E-4A09-8FF4-2D034ED0C54D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert5:*:*:*:*:*:*", "matchCriteriaId": "6A60C223-AD68-4BFF-91C1-2C7E9F727AA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert6:*:*:*:*:*:*", "matchCriteriaId": "4C313F81-8B38-4845-B1C7-CBB23D7C99B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert7:*:*:*:*:*:*", "matchCriteriaId": "A08731AB-1E43-48B9-AB4C-0B06A34D0807", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert8:*:*:*:*:*:*", "matchCriteriaId": "5A4FBB03-4A60-4A34-855B-74C5079F7769", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert9:*:*:*:*:*:*", "matchCriteriaId": "66E97D3F-3AEB-40EB-87E7-18EC7A84F0CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11.0:-:*:*:*:*:*:*", "matchCriteriaId": "69E55195-84CC-46DB-9E49-DEB864DF0659", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7F58B52D-9510-465F-8BFB-6896B4D36F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "59E72AD4-90BE-4C3B-B457-31FF193712FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "81EB266E-40BC-45EA-8EDB-4766011C460B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.12.0:-:*:*:*:*:*:*", "matchCriteriaId": "E23FCBC3-30EF-47BC-AEFE-073E84B6DBA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.12.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5AB33EDF-29D7-4092-91FE-505B39D3E57B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.12.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "4F698874-028E-410B-90FE-FDD441F55C32", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.12.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "081DA344-7266-4D67-8B92-830F43B42CC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.13.0:-:*:*:*:*:*:*", "matchCriteriaId": "01851B4A-F7CB-4263-B06C-92D39A693530", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.13.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6BB95638-D09F-4F02-9076-49BE93F2A407", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.13.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6E2DD3AF-EF01-4A1A-AF9A-98575E36D088", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.14.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "163E8F93-432A-4F68-B309-7A38AE1A30FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.14.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F53C384F-75DD-4A29-8907-BA95F08B1465", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:-:*:*:*:*:*:*", "matchCriteriaId": "6BB940E4-E612-4B27-9188-E794665191B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1:*:*:*:*:*:*", "matchCriteriaId": "2365F1EE-16A4-4293-B80E-A51CD6A2F112", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1_rc1:*:*:*:*:*:*", "matchCriteriaId": "6952FFDE-92D0-4A75-AABB-113E6FAF5A31", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1_rc2:*:*:*:*:*:*", "matchCriteriaId": "5735354A-CF57-4A9A-9607-169CE50E0655", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1_rc3:*:*:*:*:*:*", "matchCriteriaId": "38E0B2C4-55EA-4712-8E75-24A5718F9FD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert2:*:*:*:*:*:*", "matchCriteriaId": "F087C546-FBCA-4D0D-A023-8F9384CD160C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert3:*:*:*:*:*:*", "matchCriteriaId": "832F5503-6354-4E39-B927-3BA9606A372D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert4:*:*:*:*:*:*", "matchCriteriaId": "9E23AF8A-63B2-4597-8E78-A4672B0C44B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert5:*:*:*:*:*:*", "matchCriteriaId": "F76EA1D5-F5F3-49CE-9A73-20FA03C31F88", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert6:*:*:*:*:*:*", "matchCriteriaId": "593ED9E3-D56C-4336-976B-27D30EED658A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.28:cert1:*:*:lts:*:*:*", "matchCriteriaId": "E63726F0-3BC6-49E7-BDE9-71196B480149", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.28:cert2:*:*:lts:*:*:*", "matchCriteriaId": "677AB746-AE4F-46B0-BEE3-82A1FE77271F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.28:cert3:*:*:lts:*:*:*", "matchCriteriaId": "92AC8BBA-6487-449D-A070-2450B1BDE8A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.28:cert4:*:*:lts:*:*:*", "matchCriteriaId": "A5DCA653-B269-4C8C-97DD-92514461B090", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.28.0:*:*:*:lts:*:*:*", "matchCriteriaId": "C675C7BA-65E9-4A0A-9A6D-1EBCBEA1D718", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:*:*:*:*", "matchCriteriaId": "322694EF-B086-4BE7-A9F0-41D3A9C245FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:lts:*:*:*", "matchCriteriaId": "6AD7C9B3-D029-4E05-8E80-3ADA904FAC1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc1:*:*:*:*:*:*", "matchCriteriaId": "781AC882-80DD-4176-8E4F-220343B15F68", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc2:*:*:*:*:*:*", "matchCriteriaId": "770CCEEA-B121-454B-BD36-3FC1B262998A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert10:*:*:lts:*:*:*", "matchCriteriaId": "BB47EA31-CF9D-4752-804B-7804151EC87C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:*:*:*:*", "matchCriteriaId": "013B1940-C45D-4FE2-8B49-D92B8F1A9048", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:lts:*:*:*", "matchCriteriaId": "CE71221B-4D55-4643-B6D1-307B2CF41F98", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:*:*:*:*", "matchCriteriaId": "A98B11B5-B8E2-4903-B4F7-3AC23751AE8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:lts:*:*:*", "matchCriteriaId": "88124275-9BEB-4D53-9E4D-1AC8C52F2D0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert4:*:*:lts:*:*:*", "matchCriteriaId": "4F3CEFEF-72B6-4B58-81FE-01BCEEFB3013", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert5:*:*:lts:*:*:*", "matchCriteriaId": "AA637187-0EAE-4756-AD72-A0B2FABCA070", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert6:*:*:lts:*:*:*", "matchCriteriaId": "6DAF6784-0B31-4104-9D85-473D5AFAB785", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert7:*:*:lts:*:*:*", "matchCriteriaId": "77B06B83-D62C-4A0E-BE94-83C9A02CE55A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert8:*:*:lts:*:*:*", "matchCriteriaId": "CAD17809-CBB1-4E41-99C9-20FE56853563", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert9:*:*:lts:*:*:*", "matchCriteriaId": "066453F2-A77F-4E82-8C91-AC17FAA21A89", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6.0:*:*:*:lts:*:*:*", "matchCriteriaId": "D6EE9895-FB94-451D-8701-8C0DD8F5BED0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6.0:-:*:*:*:*:*:*", "matchCriteriaId": "CCDDF5C2-9B45-4811-90F6-984EF4B220CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "56849E34-B192-46A8-A517-C7C184A901B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "4610D544-156F-4E9A-BC46-9E0FF8D5D641", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1:cert1:*:*:*:*:*:*", "matchCriteriaId": "0C6CF412-290C-4524-9AFE-D58A85183864", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Asterisk Open Source 1.8 before 1.8.32.3, 11.x before 11.17.1, 12.x before 12.8.2, and 13.x before 13.3.2 and Certified Asterisk 1.8.28 before 1.8.28-cert5, 11.6 before 11.6-cert11, and 13.1 before 13.1-cert2, when registering a SIP TLS device, does not properly handle a null byte in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority." }, { "lang": "es", "value": "Asterisk Open Source 1.8 anterior a 1.8.32.3, 11.x anterior a 11.17.1, 12.x anterior a 12.8.2, y 13.x anterior a 13.3.2 y Certified Asterisk 1.8.28 anterior a 1.8.28-cert5, 11.6 anterior a 11.6-cert11, y 13.1 anterior a 13.1-cert2, cuando registra un dispositivo SIP TLS, no maneja correctamente un byte nulo en un nombre de dominio en el campo Common Name (CN) del sujeto de un certificado X.509, lo que permite a atacantes man-in-the-middle falsificar servidores SSL arbitrarios a trav\u00e9s de un certificado manipulado emitido por una autoridad de certificaci\u00f3n leg\u00edtima." } ], "id": "CVE-2015-3008", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2015-04-10T15:00:10.240", "references": [ { "source": "cve@mitre.org", "url": "http://advisories.mageia.org/MGASA-2015-0153.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2015-003.html" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162260.html" }, { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/131364/Asterisk-Project-Security-Advisory-AST-2015-003.html" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2015/Apr/22" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2016/dsa-3700" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:206" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/535222/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/74022" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1032052" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://advisories.mageia.org/MGASA-2015-0153.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2015-003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162260.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/131364/Asterisk-Project-Security-Advisory-AST-2015-003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2015/Apr/22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2016/dsa-3700" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:206" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/535222/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/74022" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1032052" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-11-14 20:29
Modified
2024-11-21 03:57
Severity ?
Summary
Buffer overflow in DNS SRV and NAPTR lookups in Digium Asterisk 15.x before 15.6.2 and 16.x before 16.0.1 allows remote attackers to crash Asterisk via a specially crafted DNS SRV or NAPTR response, because a buffer size is supposed to match an expanded length but actually matches a compressed length.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://downloads.asterisk.org/pub/security/AST-2018-010.html | Patch, Vendor Advisory | |
cve@mitre.org | https://issues.asterisk.org/jira/browse/ASTERISK-28127 | Exploit, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://downloads.asterisk.org/pub/security/AST-2018-010.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://issues.asterisk.org/jira/browse/ASTERISK-28127 | Exploit, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digium | asterisk | 15.0.0 | |
digium | asterisk | 15.0.0 | |
digium | asterisk | 15.0.0 | |
digium | asterisk | 15.1.0 | |
digium | asterisk | 15.1.0 | |
digium | asterisk | 15.1.0 | |
digium | asterisk | 15.1.2 | |
digium | asterisk | 15.1.3 | |
digium | asterisk | 15.1.4 | |
digium | asterisk | 15.1.5 | |
digium | asterisk | 15.2.0 | |
digium | asterisk | 15.2.0 | |
digium | asterisk | 15.2.1 | |
digium | asterisk | 15.2.2 | |
digium | asterisk | 15.3.0 | |
digium | asterisk | 15.3.0 | |
digium | asterisk | 15.3.0 | |
digium | asterisk | 15.4.0 | |
digium | asterisk | 15.4.0 | |
digium | asterisk | 15.4.0 | |
digium | asterisk | 15.4.1 | |
digium | asterisk | 15.5.0 | |
digium | asterisk | 15.5.0 | |
digium | asterisk | 15.6.0 | |
digium | asterisk | 15.6.0 | |
digium | asterisk | 15.6.1 | |
digium | asterisk | 16.0.0 | |
digium | asterisk | 16.0.0 | |
digium | asterisk | 16.0.0 | |
digium | asterisk | 16.0.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:15.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "75CAA3E0-1D14-4EEB-9F66-3033114389B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.0.0:b1:*:*:*:*:*:*", "matchCriteriaId": "612AC9AC-706F-4013-BA3F-83459E049387", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "A0D20EE5-E2C7-4CD3-9932-33A0C27465C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "C42CFBDA-8B84-4A8F-8C1E-207C48138DFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "8B0C2D39-0D85-4655-968F-9B6F48C4DE18", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "25307605-D767-4253-BEE7-928B89DA260A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "17F0D6D8-AE61-4A0C-B8D6-D91DECB407D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "DA48CBAB-AD3D-4D2A-9932-D21DB10F0884", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "A069FD52-C61C-49A4-A863-0FDB21B031B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "491EE070-6913-4AB4-BDB1-CFDCAEFEEFD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "72541FC4-4CC7-435F-B51D-4754E873EBDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "68A2AA7A-C598-4F0A-BF83-C804566C5B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "43A3B57E-1E68-48CF-902E-4C90FC738B5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "AA31B1CB-F285-4893-B7A4-3D16CC15CEED", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "188F9FF1-917F-4475-ABD0-AAE7C1DE3FE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0FA8E1FE-EDBB-4514-AC13-9CBD4D960A44", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "35EE1555-A2E3-43AF-B2CD-E8765B1BAB7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "2072763A-8827-46E9-83A3-515034FE5C4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "F794F923-F083-4A74-BB34-111738B975F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.4.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "C91BFC78-4EB7-40EA-A856-5A5EE8E2F360", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "8141848C-3CA7-4985-92F5-43A997D1D58D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "093D158E-5714-4301-8B25-BD4C5084148E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "EFEFA2C7-470D-4B8B-AC9A-33B910DB5848", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "91947213-906A-462B-98CA-92346C5537CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7E25333A-4264-44BF-B49F-F955E5C15981", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:15.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "579C6BBD-6202-40BC-91F8-AE8F105CE19C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:16.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "88011728-31A5-430E-8C86-F57E1BF3A2E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:16.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6FA0404B-DB1D-4A14-A6B3-54A754593846", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:16.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "DD960877-245A-4F2A-89AE-550E5939EE80", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:16.0.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "5E7A20DD-11B6-4BDE-B516-15C2E980A1E2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in DNS SRV and NAPTR lookups in Digium Asterisk 15.x before 15.6.2 and 16.x before 16.0.1 allows remote attackers to crash Asterisk via a specially crafted DNS SRV or NAPTR response, because a buffer size is supposed to match an expanded length but actually matches a compressed length." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en las b\u00fasquedas DNS SRV y NAPTR en Digium Asterisk en versiones 15.x anteriores a la 15.6.2 y versiones 16.x anteriores a la 16.0.1 permite que atacantes remotos provoquen el cierre inesperado de Asterisk mediante una respuesta DNS SRV o NAPTR especialmente manipulada. Esto se debe a que se supone que un tama\u00f1o de b\u00fafer coincide con una longitud expandida, pero en realidad coincide con una longitud comprimida." } ], "id": "CVE-2018-19278", "lastModified": "2024-11-21T03:57:39.890", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-11-14T20:29:00.587", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/AST-2018-010.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-28127" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/AST-2018-010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-28127" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-11-24 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
Race condition in the chan_pjsip channel driver in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1 allows remote attackers to cause a denial of service (assertion failure and crash) via a cancel request for a SIP session with a queued action to (1) answer a session or (2) send ringing.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "F21F0B73-A30F-4673-B3A8-D9F456FFCEF2", "versionEndExcluding": "12.7.1", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C83CD93-7CBA-4FF0-B29E-A509F4A3D5E2", "versionEndExcluding": "13.0.1", "versionStartIncluding": "13.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Race condition in the chan_pjsip channel driver in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1 allows remote attackers to cause a denial of service (assertion failure and crash) via a cancel request for a SIP session with a queued action to (1) answer a session or (2) send ringing." }, { "lang": "es", "value": "Condici\u00f3n de carrera en el controlador de canales chan_pjsip en Asterisk Open Source 12.x anterior a 12.7.1 y 13.x anterior a 13.0.1 permite a atacantes remotos causar una denegaci\u00f3n de servicio (fallo de aserci\u00f3n y ca\u00edda) a trav\u00e9s de una solicitud cancel para una sesi\u00f3n SIP con una acci\u00f3n en cola para (1) responder a una sesi\u00f3n o (2) enviar tonos de llamada." } ], "id": "CVE-2014-8415", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-11-24T15:59:07.327", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-015.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-11-24 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
ConfBridge in Asterisk 11.x before 11.14.1, 12.x before 12.7.1, and 13.x before 13.0.1 and Certified Asterisk 11.6 before 11.6-cert8 allows remote authenticated users to (1) gain privileges via vectors related to an external protocol to the CONFBRIDGE dialplan function or (2) execute arbitrary system commands via a crafted ConfbridgeStartRecord AMI action.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digium | asterisk | * | |
digium | asterisk | * | |
digium | asterisk | * | |
digium | certified_asterisk | 11.6 | |
digium | certified_asterisk | 11.6 | |
digium | certified_asterisk | 11.6 | |
digium | certified_asterisk | 11.6 | |
digium | certified_asterisk | 11.6 | |
digium | certified_asterisk | 11.6 | |
digium | certified_asterisk | 11.6 | |
digium | certified_asterisk | 11.6.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CDFB271-72DA-4E23-87A0-E50EE633843F", "versionEndExcluding": "11.14.1", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "F21F0B73-A30F-4673-B3A8-D9F456FFCEF2", "versionEndExcluding": "12.7.1", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C83CD93-7CBA-4FF0-B29E-A509F4A3D5E2", "versionEndExcluding": "13.0.1", "versionStartIncluding": "13.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:*:*:*:*", "matchCriteriaId": "322694EF-B086-4BE7-A9F0-41D3A9C245FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:*:*:*:*", "matchCriteriaId": "013B1940-C45D-4FE2-8B49-D92B8F1A9048", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:*:*:*:*", "matchCriteriaId": "A98B11B5-B8E2-4903-B4F7-3AC23751AE8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert4:*:*:*:*:*:*", "matchCriteriaId": "C7D60B24-C509-49C3-87A9-49D05CB44183", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert5:*:*:*:*:*:*", "matchCriteriaId": "3C1F9978-44E7-4D39-BEC6-5C6DB7F893E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert6:*:*:*:*:*:*", "matchCriteriaId": "69BA61A8-2A95-4800-BB4E-692BA4321A84", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert7:*:*:*:*:*:*", "matchCriteriaId": "C481D8B0-622D-491D-B292-717B0369B507", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6.0:-:*:*:*:*:*:*", "matchCriteriaId": "CCDDF5C2-9B45-4811-90F6-984EF4B220CF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ConfBridge in Asterisk 11.x before 11.14.1, 12.x before 12.7.1, and 13.x before 13.0.1 and Certified Asterisk 11.6 before 11.6-cert8 allows remote authenticated users to (1) gain privileges via vectors related to an external protocol to the CONFBRIDGE dialplan function or (2) execute arbitrary system commands via a crafted ConfbridgeStartRecord AMI action." }, { "lang": "es", "value": "ConfBridge en Asterisk 11.x anterior a 11.14.1, 12.x anterior a 12.7.1, y 13.x anterior a 13.0.1 y Certified Asterisk 11.6 anterior a 11.6-cert8 permite a usuarios remotos autenticados (1) ganar privilegios a trav\u00e9s de vectores relacionados con un protocolo externo en la funci\u00f3n CONFBRIDGE dialplan o (2) ejecutar comandos del sistema arbitrarios a trav\u00e9s de una acci\u00f3n ConfbridgeStartRecord AMI manipulada." } ], "id": "CVE-2014-8417", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-11-24T15:59:09.343", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-017.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-06-12 04:29
Modified
2024-11-21 03:44
Severity ?
Summary
An issue was discovered in Asterisk Open Source 13.x before 13.21.1, 14.x before 14.7.7, and 15.x before 15.4.1 and Certified Asterisk 13.18-cert before 13.18-cert4 and 13.21-cert before 13.21-cert2. When endpoint specific ACL rules block a SIP request, they respond with a 403 forbidden. However, if an endpoint is not identified, then a 401 unauthorized response is sent. This vulnerability just discloses which requests hit a defined endpoint. The ACL rules cannot be bypassed to gain access to the disclosed endpoints.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://downloads.asterisk.org/pub/security/AST-2018-008.html | Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/104455 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://issues.asterisk.org/jira/browse/ASTERISK-27818 | Patch, Vendor Advisory | |
cve@mitre.org | https://security.gentoo.org/glsa/201811-11 | Third Party Advisory | |
cve@mitre.org | https://www.debian.org/security/2018/dsa-4320 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://downloads.asterisk.org/pub/security/AST-2018-008.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104455 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://issues.asterisk.org/jira/browse/ASTERISK-27818 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201811-11 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2018/dsa-4320 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digium | asterisk | * | |
digium | asterisk | * | |
digium | asterisk | * | |
digium | certified_asterisk | 13.18 | |
digium | certified_asterisk | 13.18 | |
digium | certified_asterisk | 13.18 | |
digium | certified_asterisk | 13.21 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "85FB9D68-8BEE-40F5-8175-DC62C0EAFE8F", "versionEndExcluding": "13.21.1", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "33B74E57-BD3C-4C54-A27C-F32DEF133390", "versionEndExcluding": "14.7.7", "versionStartExcluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "41536B2F-2D75-406D-95CC-64889838F0B1", "versionEndExcluding": "15.4.1", "versionStartIncluding": "15.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.18:cert1:*:*:*:*:*:*", "matchCriteriaId": "05795EED-0473-4806-A9AD-FD92212CCC77", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.18:cert2:*:*:*:*:*:*", "matchCriteriaId": "C3F701AA-E842-4680-9747-000C3A4F6E4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.18:cert3:*:*:*:*:*:*", "matchCriteriaId": "4B0FC294-F910-491B-9DEF-9FFEACA208C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.21:cert1:*:*:*:*:*:*", "matchCriteriaId": "B7EE2BD3-51DC-4DA5-A5F2-6275F5277BE7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Asterisk Open Source 13.x before 13.21.1, 14.x before 14.7.7, and 15.x before 15.4.1 and Certified Asterisk 13.18-cert before 13.18-cert4 and 13.21-cert before 13.21-cert2. When endpoint specific ACL rules block a SIP request, they respond with a 403 forbidden. However, if an endpoint is not identified, then a 401 unauthorized response is sent. This vulnerability just discloses which requests hit a defined endpoint. The ACL rules cannot be bypassed to gain access to the disclosed endpoints." }, { "lang": "es", "value": "Se ha descubierto un problema en Asterisk Open Source en versiones 13.x anteriores a la 13.21.1; versiones 14.x anteriores a la 14.7.7 y las versiones 15.x anteriores a la 15.4.1, as\u00ed como Certified Asterisk en versiones 13.18-cert anteriores a la 13.18-cert4 y 13.21-cert anteriores a la 13.21-cert2. Cuando las reglas de lista de control de acceso (ACL) espec\u00edficas del endpoint bloquean una petici\u00f3n SIP, responden con un mensaje de error 403 prohibido. Sin embargo, si no se identifica un endpoint, se env\u00eda una respuesta 401 no autorizada. Esta vulnerabilidad s\u00f3lo revela qu\u00e9 peticiones llegan a un endpoint definido. Las reglas de lista de control de acceso (ACL) no pueden omitirse para obtener acceso a los endpoints revelados." } ], "id": "CVE-2018-12227", "lastModified": "2024-11-21T03:44:49.003", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-06-12T04:29:00.220", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2018-008.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104455" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27818" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201811-11" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4320" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2018-008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104455" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27818" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201811-11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4320" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-03-07 00:19
Modified
2025-04-09 00:30
Severity ?
Summary
Asterisk 1.4 before 1.4.1 and 1.2 before 1.2.16 allows remote attackers to cause a denial of service (crash) by sending a Session Initiation Protocol (SIP) packet without a URI and SIP-version header, which results in a NULL pointer dereference.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digium | asterisk | 1.2.0_beta1 | |
digium | asterisk | 1.2.0_beta2 | |
digium | asterisk | 1.2.6 | |
digium | asterisk | 1.2.7 | |
digium | asterisk | 1.2.8 | |
digium | asterisk | 1.2.9 | |
digium | asterisk | 1.2.10 | |
digium | asterisk | 1.2.11 | |
digium | asterisk | 1.2.12 | |
digium | asterisk | 1.2.12.1 | |
digium | asterisk | 1.2.13 | |
digium | asterisk | 1.2.14 | |
digium | asterisk | 1.2.15 | |
digium | asterisk | 1.2_beta1 | |
digium | asterisk | 1.2_beta2 | |
digium | asterisk | 1.4.0 | |
digium | asterisk | 1.4.0_beta1 | |
digium | asterisk | 1.4.0_beta2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.2.0_beta1:*:*:*:*:*:*:*", "matchCriteriaId": "4042CC21-F3CB-4C77-9E60-AF8AA9A191C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.0_beta2:*:*:*:*:*:*:*", "matchCriteriaId": "C656168D-7D6A-4E84-9196-A8B170E1F7CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "C619138A-557F-419E-9832-D0FB0E9042C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "B6656EA0-4D4F-4251-A30F-48375C5CE3E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "4AAD9104-BA4A-478F-9B56-195E0F9A7DF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "4F06C361-D7DF-474B-A835-BA8886C11A80", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "175954A5-E712-41B8-BC11-4F999343063D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "1DF9E41E-8FE6-4396-A5D4-D4568600FE03", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "4457486F-E9B4-46B8-A05D-3B32F8B639A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "69417F54-D92F-46FB-9BFA-995211279C0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "4611BEA0-25EC-4705-A390-6DF678373FF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "53022458-F443-4402-AC52-FC3AE810E89E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "120B85AA-E9B8-4A4D-81CE-FD36CDB63074", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2_beta1:*:*:*:*:*:*:*", "matchCriteriaId": "61FAB63F-B9F8-4D39-AEE9-BC0E54BAA944", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2_beta2:*:*:*:*:*:*:*", "matchCriteriaId": "1BC20315-40B5-4DA1-AC49-E911C03AEA6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E56DB29-571D-4615-B347-38CF4590E463", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0_beta1:*:*:*:*:*:*:*", "matchCriteriaId": "6B909947-44E3-463E-9FAD-76C8E21A54E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0_beta2:*:*:*:*:*:*:*", "matchCriteriaId": "1FB2F8AA-B70B-4280-BDBD-023037C16D70", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Asterisk 1.4 before 1.4.1 and 1.2 before 1.2.16 allows remote attackers to cause a denial of service (crash) by sending a Session Initiation Protocol (SIP) packet without a URI and SIP-version header, which results in a NULL pointer dereference." }, { "lang": "es", "value": "Asterisk versiones 1.4 anteriores a 1.4.1 y versiones 1.2 anteriores a 1.2.16, permite a atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo) enviando un paquete de Session Initiation Protocol (SIP) sin una URI y Encabezado SIP-version, lo que resulta en una desreferencia del puntero NULL." } ], "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html \r\n\u0027CWE-476: NULL Pointer Dereference\u0027", "id": "CVE-2007-1306", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-03-07T00:19:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://asterisk.org/node/48319" }, { "source": "cve@mitre.org", "url": "http://asterisk.org/node/48320" }, { "source": "cve@mitre.org", "url": "http://labs.musecurity.com/advisories/MU-200703-01.txt" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/24380" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24578" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25582" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200703-14.xml" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2007/dsa-1358" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/228032" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/33888" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/22838" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1017723" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/0830" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32830" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://asterisk.org/node/48319" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://asterisk.org/node/48320" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://labs.musecurity.com/advisories/MU-200703-01.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/24380" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24578" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25582" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200703-14.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2007/dsa-1358" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/228032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2007_34_asterisk.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/33888" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/22838" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1017723" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/0830" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32830" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-07-06 19:55
Modified
2025-04-11 00:51
Severity ?
Summary
reqresp_parser.c in the SIP channel driver in Asterisk Open Source 1.8.x before 1.8.4.3 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a SIP packet with a Contact header that lacks a < (less than) character.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digium | asterisk | 1.8.0 | |
digium | asterisk | 1.8.0 | |
digium | asterisk | 1.8.0 | |
digium | asterisk | 1.8.0 | |
digium | asterisk | 1.8.0 | |
digium | asterisk | 1.8.0 | |
digium | asterisk | 1.8.0 | |
digium | asterisk | 1.8.0 | |
digium | asterisk | 1.8.0 | |
digium | asterisk | 1.8.0 | |
digium | asterisk | 1.8.1 | |
digium | asterisk | 1.8.1 | |
digium | asterisk | 1.8.1.1 | |
digium | asterisk | 1.8.1.2 | |
digium | asterisk | 1.8.2 | |
digium | asterisk | 1.8.2.1 | |
digium | asterisk | 1.8.2.2 | |
digium | asterisk | 1.8.2.3 | |
digium | asterisk | 1.8.2.4 | |
digium | asterisk | 1.8.3 | |
digium | asterisk | 1.8.3 | |
digium | asterisk | 1.8.3 | |
digium | asterisk | 1.8.3 | |
digium | asterisk | 1.8.3.1 | |
digium | asterisk | 1.8.3.2 | |
digium | asterisk | 1.8.3.3 | |
digium | asterisk | 1.8.4 | |
digium | asterisk | 1.8.4 | |
digium | asterisk | 1.8.4 | |
digium | asterisk | 1.8.4 | |
digium | asterisk | 1.8.4.1 | |
digium | asterisk | 1.8.4.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6344E43-E8AA-4340-B3A7-72F5D6A5D184", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "4C170C1C-909D-4439-91B5-DB1A9CD150C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EE821BE5-B1D3-4854-A700-3A83E5F15724", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "149C57CA-0B4B-4220-87FC-432418D1C393", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "035595D5-BBEC-4D85-AD7A-A2C932D2BA70", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "6DAF5655-F09F-47F8-AFA6-4B95F77A57F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F8E001D8-0A7B-4FDD-88E3-E124ED32B81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9D5CFFBD-785F-4417-A54A-F3565FD6E736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "D30EF999-92D1-4B19-8E32-1E4B35DE4EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "A67D156B-9C43-444F-ADEC-B21D99D1433C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "893EB152-6444-43DB-8714-9735354C873A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8447EE7-A834-41D7-9204-07BD3752870C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C04F2C9-5672-42F2-B664-A3EE4C954C29", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "33465668-4C91-4619-960A-D26D77853E53", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "CAD08674-0B44-44EA-940B-6812E2D5077D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "EEE87710-A129-43AA-BA08-8001848975FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F582C6E-5DA0-4D72-A40E-66BDBC5CF2B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CEBB8-01B3-4A05-AFE8-37A143C9833E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "522733A7-E89E-4BFD-AC93-D6882636E880", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "2FAC47DD-B613-43E4-B9BF-6120B81D9789", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "86D20CB5-60E8-405E-B387-CF80C7DA5E07", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "71AB5A01-5961-4053-9111-CF32C6473A00", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*", "matchCriteriaId": "77D8E1DC-041F-4B87-AF9A-E0EC4D6A4BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7CCCB892-30CE-4BEF-904E-5D957F94D0EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "F156798F-F2EF-4366-B17E-03165AB437D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "9EFBB9A6-DD1D-436E-919F-74A3E4F40396", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "054E34C8-B6A5-48C7-938E-D3C268E0E8BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*", "matchCriteriaId": "1DCECA72-533A-4A95-AB19-20C5F09A1B01", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*", "matchCriteriaId": "0E2309F8-AFEE-4150-99D1-BA606432ED73", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*", "matchCriteriaId": "7785F282-BFA0-400A-8398-872ACCA4BF37", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1278D3FB-78C6-4F7D-A845-0A93D4F6E2B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "C00A6EFB-A848-46D3-AAD7-FD8140007E42", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "reqresp_parser.c in the SIP channel driver in Asterisk Open Source 1.8.x before 1.8.4.3 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a SIP packet with a Contact header that lacks a \u003c (less than) character." }, { "lang": "es", "value": "reqresp_parser.c en el controlador de canal SIP en Asterisk Open Source v1.8.x anteriores a v1.8.4.3 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (desreferencia a puntero NULL y ca\u00edda del demonio) a trav\u00e9s de un paquete SIP con una cabecera Contact que carece de un car\u00e1cter \u003c (menos que)." } ], "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\r\n\u0027CWE-476: NULL Pointer Dereference\u0027", "id": "CVE-2011-2665", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-07-06T19:55:03.590", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://downloads.asterisk.org/pub/security/AST-2011-009-1.8.diff" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2011-009.html" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062628.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/45048" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/45201" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/45239" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2276" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://downloads.asterisk.org/pub/security/AST-2011-009-1.8.diff" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2011-009.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062628.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/45048" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/45201" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/45239" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2276" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-12-12 21:59
Modified
2025-04-12 10:46
Severity ?
Summary
An issue was discovered in Asterisk Open Source 13.12.x and 13.13.x before 13.13.1 and 14.x before 14.2.1. If an SDP offer or answer is received with the Opus codec and with the format parameters separated using a space the code responsible for parsing will recursively call itself until it crashes. This occurs as the code does not properly handle spaces separating the parameters. This does NOT require the endpoint to have Opus configured in Asterisk. This also does not require the endpoint to be authenticated. If guest is enabled for chan_sip or anonymous in chan_pjsip an SDP offer or answer is still processed and the crash occurs.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:13.12:*:*:*:*:*:*:*", "matchCriteriaId": "6A96EB57-835A-45B4-82F5-31F925A85629", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.13:*:*:*:*:*:*:*", "matchCriteriaId": "86B16D04-3808-4380-8F64-0C36B185C1F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.0:*:*:*:*:*:*:*", "matchCriteriaId": "C949D5F5-6C0B-4B17-85B6-3A77D08CF967", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.1:*:*:*:*:*:*:*", "matchCriteriaId": "C039C0CE-9C9C-4D85-8D7C-574DCF9D920B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.01:*:*:*:*:*:*:*", "matchCriteriaId": "A1B2F2CC-18C3-46E7-8E7F-970622A710C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D2C4DA60-5701-4BD0-B2F9-D93B9E64111F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "0B12834D-2AF1-4AD1-AB23-859CAA5D3210", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.02:*:*:*:*:*:*:*", "matchCriteriaId": "89036D04-EA04-4041-9694-6768478D35F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.2:*:*:*:*:*:*:*", "matchCriteriaId": "B19070D3-9F03-43C7-9F31-9A54BD5F2441", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Asterisk Open Source 13.12.x and 13.13.x before 13.13.1 and 14.x before 14.2.1. If an SDP offer or answer is received with the Opus codec and with the format parameters separated using a space the code responsible for parsing will recursively call itself until it crashes. This occurs as the code does not properly handle spaces separating the parameters. This does NOT require the endpoint to have Opus configured in Asterisk. This also does not require the endpoint to be authenticated. If guest is enabled for chan_sip or anonymous in chan_pjsip an SDP offer or answer is still processed and the crash occurs." }, { "lang": "es", "value": "Se descubri\u00f3 un problema en Asterisk Open Source 13.12.x y 13.13.x en versiones anteriores 13.13.1 y 14.x en versiones anteriores 14.2.1. Si se recibe una prueba o respuesta SDP con el codec Opus y con los par\u00e1metros de formato separados usando un espacio de c\u00f3digo responsable de an\u00e1lisis llamar\u00e1 a si mismo de forma recursiva hasta que se bloquee. Esto ocurre cuando el c\u00f3digo no maneja adecuadamente los espacios que separan los par\u00e1metros. Esto NO requiere que el punto final tenga Opus configurado en Asterisk. Esto tampoco requiere que el punto final est\u00e9 autenticado. Si el invitado est\u00e1 habilitado para chan_sip o an\u00f3nimo en chan_pjsip una prueba o respuesta SDP se sigue procesando y se produce el bloqueo." } ], "id": "CVE-2016-9937", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-12-12T21:59:00.303", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2016-008-13.diff" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2016-008-14.diff" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2016-008.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94792" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1037407" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-26579" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2016-008-13.diff" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2016-008-14.diff" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2016-008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94792" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1037407" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-26579" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-11-10 18:30
Modified
2025-04-09 00:30
Severity ?
Summary
Asterisk Open Source 1.2.x before 1.2.35, 1.4.x before 1.4.26.3, 1.6.0.x before 1.6.0.17, and 1.6.1.x before 1.6.1.9; Business Edition A.x.x, B.x.x before B.2.5.12, C.2.x.x before C.2.4.5, and C.3.x.x before C.3.2.2; AsteriskNOW 1.5; and s800i 1.3.x before 1.3.0.5 generate different error messages depending on whether a SIP username is valid, which allows remote attackers to enumerate valid usernames via multiple crafted REGISTER messages with inconsistent usernames in the URI in the To header and the Digest in the Authorization header.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "39358795-09A6-44C6-B969-1560CEF40057", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "8C2DAB51-91ED-43D4-AEA9-7C4661089BAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "A596A018-2FBC-4CEB-9910-756CC6598679", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "14BDCF8E-0B68-430A-A463-EE40C1A9AD65", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "CA2CD93E-71A5-49EC-B986-5868C05553EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "2B66B213-4397-4435-8E48-8ED69AAE13D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "55131A3D-C892-44EC-83D6-5888C57B11A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.2:netsec:*:*:*:*:*:*", "matchCriteriaId": "E017DD53-B8EC-4EA2-BF59-18C075C5771D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B940EEC6-4451-42B9-A56D-BDB8801B3685", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.3:netsec:*:*:*:*:*:*", "matchCriteriaId": "CE4AB19F-1338-466D-AAD8-584C79FED1AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "175954A5-E712-41B8-BC11-4F999343063D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.10:netsec:*:*:*:*:*:*", "matchCriteriaId": "FF5A2AA3-BB1F-4DEA-A369-183877BBDAC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "1DF9E41E-8FE6-4396-A5D4-D4568600FE03", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.11:netsec:*:*:*:*:*:*", "matchCriteriaId": "7B43C508-91E3-49C9-86F0-3643D8F2B7F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "4457486F-E9B4-46B8-A05D-3B32F8B639A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.12:netsec:*:*:*:*:*:*", "matchCriteriaId": "0831E658-36AB-4A4B-9929-3DB6BE855A3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "69417F54-D92F-46FB-9BFA-995211279C0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.12.1:netsec:*:*:*:*:*:*", "matchCriteriaId": "46A770C7-A7D4-44E3-A8B4-AC2189EAC3DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "4611BEA0-25EC-4705-A390-6DF678373FF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.13:netsec:*:*:*:*:*:*", "matchCriteriaId": "4BCD1F97-4B56-4DA8-A6EC-FA42A3CB9B97", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "53022458-F443-4402-AC52-FC3AE810E89E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "120B85AA-E9B8-4A4D-81CE-FD36CDB63074", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.15:netsec:*:*:*:*:*:*", "matchCriteriaId": "64D94742-7CA1-487B-90E8-5063FBF88925", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "12302460-5D3F-4045-9DBF-606562E03BDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.16:netsec:*:*:*:*:*:*", "matchCriteriaId": "78546FDF-C843-4E48-ABEE-CC3514AA7C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "8D6EBC0B-9842-44D1-B9D6-EFB88BE22879", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.17:netsec:*:*:*:*:*:*", "matchCriteriaId": "052969F1-6758-46E8-9273-E0F872BD65BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "624A0F00-4629-4550-847F-F24CC93DFF2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.18:netsec:*:*:*:*:*:*", "matchCriteriaId": "E473F645-F8B0-43FE-957B-F053427465DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "10FC9AAB-1FAD-4953-A2FC-D42E9687D27E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.19:netsec:*:*:*:*:*:*", "matchCriteriaId": "460C9907-AA19-402A-85DE-D3CEA98B107B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "CD80F0D6-6B5B-41D3-AC41-F1643865088A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.20:netsec:*:*:*:*:*:*", "matchCriteriaId": "734D5198-53C1-40D3-B5BF-D74FC71FD3BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.21:*:*:*:*:*:*:*", "matchCriteriaId": "788DEF5E-8A99-463D-89DC-0CC032271554", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.21:netsec:*:*:*:*:*:*", "matchCriteriaId": "C0996D7A-9419-4897-A0AF-498AC3A2A81F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "62D670E6-47E5-4B40-9217-F97D5F39C3EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.21.1:netsec:*:*:*:*:*:*", "matchCriteriaId": "94C23DB8-3C92-40FE-B8A6-ADF84D28510E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "A6CE7E4E-DA2D-4F03-A226-92965B40AE34", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.22:netsec:*:*:*:*:*:*", "matchCriteriaId": "0C59A947-457E-47EB-832E-3DA70CB52695", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.23:*:*:*:*:*:*:*", "matchCriteriaId": "55F74B56-B412-4AF1-AED0-C948AB6DC829", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.23:netsec:*:*:*:*:*:*", "matchCriteriaId": "3B50ADDB-D3C2-407D-8844-F93866E5F20C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.24:*:*:*:*:*:*:*", "matchCriteriaId": "2775A7CC-2D88-4F2D-8C26-1E0DDDD681E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.24:netsec:*:*:*:*:*:*", "matchCriteriaId": "F4149B59-E773-4ED8-A71D-EB7D00808819", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.25:*:*:*:*:*:*:*", "matchCriteriaId": "5A0408C3-0FA7-4A17-9451-C4D46CDA8F27", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.25:netsec:*:*:*:*:*:*", "matchCriteriaId": "1726090D-0C37-44A4-AD9B-7ED733B8702D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.26:*:*:*:*:*:*:*", "matchCriteriaId": "B92B045B-8CD6-4C04-9CCB-DCE9A44F6C12", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.26:netsec:*:*:*:*:*:*", "matchCriteriaId": "54354E16-3238-43E8-BAA9-93CA7EB44D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.26.1:*:*:*:*:*:*:*", "matchCriteriaId": "6867EED4-FC3B-4B72-88A5-DED96C729FE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.26.1:netsec:*:*:*:*:*:*", "matchCriteriaId": "1A0867FC-7161-433F-A416-D7207C8D4D36", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.26.2:*:*:*:*:*:*:*", "matchCriteriaId": "97BE6B60-3276-4580-843B-743D0D71E3DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.26.2:netsec:*:*:*:*:*:*", "matchCriteriaId": "36491B32-A405-4C5B-938F-9BEA50A8AF16", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.27:*:*:*:*:*:*:*", "matchCriteriaId": "6141909B-EBC4-4726-AE9F-669C31257A5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.28:*:*:*:*:*:*:*", "matchCriteriaId": "754A51AC-EF20-4736-ADDB-D2A70BCB79EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "4600BB66-6DEB-444B-AF9E-BDD06CFD2876", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.29:*:*:*:*:*:*:*", "matchCriteriaId": "EE089E31-3521-4D12-B81C-B6E386AE1409", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "FFE86E95-1110-46DF-9A7A-0E1AA56ACE4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.30.1:*:*:*:*:*:*:*", "matchCriteriaId": "5B6DF5C5-85B4-4595-A69B-1DE70B5E0E41", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.30.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F5E9888-16CD-4DB2-8889-CE4477559C71", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.30.3:*:*:*:*:*:*:*", "matchCriteriaId": "C29C9A2C-6435-444E-A20B-5881F3798B85", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.30.4:*:*:*:*:*:*:*", "matchCriteriaId": "E77A2569-CFAE-498D-A633-803849CFECE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "D16E88E6-42D0-400E-AF43-111B35CE11E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.31.1:*:*:*:*:*:*:*", "matchCriteriaId": "AE15A42E-030B-48F0-9498-1755DAAEDFB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.32:*:*:*:*:*:*:*", "matchCriteriaId": "39511726-1202-4179-9708-4D3B28496768", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.33:*:*:*:*:*:*:*", "matchCriteriaId": "2A9A4328-F274-4591-A386-943FD6608374", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.34:*:*:*:*:*:*:*", "matchCriteriaId": "1B4A8C9A-A475-4F02-A6BC-F17CEECBF0AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E56DB29-571D-4615-B347-38CF4590E463", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "FC1188DA-6C27-48D2-9CE7-74D77B24EE9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "A93B8F91-5C56-44DE-AE29-8468E853759F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "BF7F4D02-7C8E-403C-A53E-A5F8C07F33A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "D85031A3-3444-4650-905D-721F1EBAA24F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "6F0AC2B3-6E8A-4B26-8A6C-792D9E5072C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "2BC8D6D4-A389-4A78-8DA8-351A9CB896E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "5E979AC4-58EA-4297-9F90-350924BBE440", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "3A58CCD3-4A0C-468B-85F2-59A52B7293A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "3542DB91-8487-49D6-AA15-E8FD9D6B99D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "6BA4F3F1-C3F1-4E15-A854-9BB84E33E4AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "661D710E-79F0-4E98-B35B-ED0549D35C24", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "68291ADE-F9D1-427B-B150-FDA7F2F4788B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F80CBCB-F58D-4BE7-8E78-67E04C900D01", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "EB61D32E-3400-480E-BD27-BA3F98F94427", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "D9154EDB-CAE6-4BB0-8D02-9EC2B81D93C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "A432B0A7-F158-4B9C-97F6-6A29DB13EAFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "687C67CB-46AF-40C2-8A02-081C7F78568A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "6E8D6EC0-A61E-4DBC-A0C7-864E9C4BDA1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EF7F65A-45FD-4586-901E-49B057100BB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "300F158E-ED27-46C8-85E4-AA0AA6B201DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "FB6F04C0-3226-4D2C-97A3-39999483C62C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "30685A20-963A-48D4-B7D7-2C11C2C812AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "C54C3AAC-4D5D-4661-86AB-6849982E8C67", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "6F847916-89F1-4AA6-973D-6002C8B54EE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "5359815E-671A-4DFD-9E99-8CF903A03C84", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "E2EFBC9E-4DCA-43CB-93EB-6807E2383A98", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.18:*:*:*:*:*:*:*", "matchCriteriaId": "98755B1B-CAD5-4AC5-8571-52E67C3A8274", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:*:*:*:*:*:*:*", "matchCriteriaId": "C9D8C8FE-3D09-4F60-AD03-9D4439942141", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc1:*:*:*:*:*:*", "matchCriteriaId": "902FBE4B-5237-43CD-8EB6-D2CAC0F30879", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc2:*:*:*:*:*:*", "matchCriteriaId": "708DCACA-49EC-468D-81EC-CE5367F8A164", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc3:*:*:*:*:*:*", "matchCriteriaId": "BA9E3314-7D23-414C-8187-16D807410B62", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc4:*:*:*:*:*:*", "matchCriteriaId": "D824ED7B-BAB6-4C0F-A6B0-A75AB072EC0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A01CE63-F834-48B2-826D-2DAD1B4AE8C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "88B9CC9D-3DC2-4674-BA52-4C6D4E2056C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:*:*:*:*:*:*:*", "matchCriteriaId": "43F1849F-1230-45E7-B6A3-D6FC72EB0F11", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc1:*:*:*:*:*:*", "matchCriteriaId": "873C9C7E-93A3-4269-B19C-AB33A21C1AC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc2:*:*:*:*:*:*", "matchCriteriaId": "457F2112-7C5E-4953-8F4C-117925D486DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc3:*:*:*:*:*:*", "matchCriteriaId": "BD15ADD6-D7FA-441A-A9BC-487BCC15F2A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "792A8901-B7B8-40E8-9258-6338B72770FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:*:*:*:*:*:*:*", "matchCriteriaId": "0E6C8F78-0C00-45A5-8FEB-2A4BD5AC1A37", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:rc1:*:*:*:*:*:*", "matchCriteriaId": "F3E04247-C4EF-4C1B-B879-5C02986950D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:rc2:*:*:*:*:*:*", "matchCriteriaId": "5E382FC8-4001-4058-9151-05AE98B4A35E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "11FECE6B-B6A6-4DDA-9019-9A10B05EC1F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "D9813D27-0688-4989-99EB-1DC0F82D59F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:*:*:*:*:*:*:*", "matchCriteriaId": "D4333904-9D21-4149-965F-F49F0A34BD85", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc1:*:*:*:*:*:*", "matchCriteriaId": "F7180626-F0FD-46F3-AD52-5C67525C4B46", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc2:*:*:*:*:*:*", "matchCriteriaId": "85A1E3A3-C157-4F3D-9477-F63771E7F627", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc3:*:*:*:*:*:*", "matchCriteriaId": "FEE739CC-7A9C-489E-BFC0-6257129C043D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc4:*:*:*:*:*:*", "matchCriteriaId": "ADC0E947-A95A-44ED-8DED-CC769FF00569", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc5:*:*:*:*:*:*", "matchCriteriaId": "DE52BD9F-3728-455C-BC45-1A4DB926FFE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22.1:*:*:*:*:*:*:*", "matchCriteriaId": "1EF82D41-9222-42D3-ADAD-94B4F950C63F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AE9F181-A8E4-4700-A30F-211CDE251606", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:*:*:*:*:*:*:*", "matchCriteriaId": "5B10AE4B-EC2D-4D5B-B842-50F5097A0650", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc1:*:*:*:*:*:*", "matchCriteriaId": "83E854D0-17A2-473B-B7E8-41E6447C81DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc2:*:*:*:*:*:*", "matchCriteriaId": "47169133-3854-4D8F-B79E-3CC77A166EF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc3:*:*:*:*:*:*", "matchCriteriaId": "6071601F-CF37-4E66-9D6D-AFC3434C18AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc4:*:*:*:*:*:*", "matchCriteriaId": "2A575824-E005-4820-824A-4875594619E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "080C7089-5662-4A94-9842-C4A26095DA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23.2:*:*:*:*:*:*:*", "matchCriteriaId": "7AE38697-0B16-4032-9234-CA263E4A9885", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.24:*:*:*:*:*:*:*", "matchCriteriaId": "DCB18BE2-B073-429C-ABE7-B8305793DAE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.24:rc1:*:*:*:*:*:*", "matchCriteriaId": "FA7216BA-A42F-4ED8-8086-B4FA483FDAB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "CB7D2048-CD61-46C0-830B-11976B275783", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.25:*:*:*:*:*:*:*", "matchCriteriaId": "8DBA63FE-62AF-4F3D-B30C-550D17C4E35F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.25:rc1:*:*:*:*:*:*", "matchCriteriaId": "AD0A0F19-020D-4578-9023-12B0CB646D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.25.1:*:*:*:*:*:*:*", "matchCriteriaId": "96D5A1E3-FF0B-4C71-AA51-655D7106880D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:*:*:*:*:*:*:*", "matchCriteriaId": "E5D425E6-E2E5-4452-9EAA-2697C1155784", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc1:*:*:*:*:*:*", "matchCriteriaId": "9855FA26-0930-4AC9-A920-B394F6916349", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc2:*:*:*:*:*:*", "matchCriteriaId": "BBA21246-7DF4-41BC-998A-05D38FC97C8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc3:*:*:*:*:*:*", "matchCriteriaId": "EE9A7984-22C9-4296-8E44-C010E67F193D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc4:*:*:*:*:*:*", "matchCriteriaId": "51B2C42A-C252-4BD8-A908-8F30C2BF15E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc5:*:*:*:*:*:*", "matchCriteriaId": "2137CEAD-0F19-43C5-A26D-1972564FCD8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc6:*:*:*:*:*:*", "matchCriteriaId": "B7552466-B782-4F16-8561-A2A51E94FED4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26.1:*:*:*:*:*:*:*", "matchCriteriaId": "C2F8C82D-3031-4C62-89FA-3BF56EA29727", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26.2:*:*:*:*:*:*:*", "matchCriteriaId": "B3074CEA-46BD-4CAD-BF5C-10008A80E434", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B8374B5D-DE7A-4C3C-A5FE-579B17006A54", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "C7494CE2-D3CC-404D-BE61-09A2E1FB3E47", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "06E48482-D9AF-4038-80DA-27D9B4907C0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "9BC3C441-290F-471A-BA19-6B1C4D72A670", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "632ED295-B67D-43CF-BF38-CCE04088BA08", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "50F3835F-6F2B-4EA7-B111-3B3C26548BC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "0DCF7BD2-7903-4DC5-ADDC-EFCDC58736C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "E5BECFE0-286F-4DA1-8CA9-6CEE861C3012", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta7.1:*:*:*:*:*:*", "matchCriteriaId": "AFFF3245-2D0F-46E3-A1D6-319086489DC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta8:*:*:*:*:*:*", "matchCriteriaId": "C91F2524-99D1-4C4B-9A31-21C0FB8B4D5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta9:*:*:*:*:*:*", "matchCriteriaId": "7B1BC0FF-9DB6-4FCC-A845-053943CF0D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "419D4D16-E790-4872-B9AF-1320978768C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "73D30BA6-1EE0-4C3F-8F69-65C698A1B9A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:rc6:*:*:*:*:*:*", "matchCriteriaId": "D39FA25D-AB56-470D-94AB-14446DB7D475", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4225252F-5960-4A42-A575-00C125860E89", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A65D76A8-BBDD-4BDE-B789-D745C400DCBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "A8B0F5A5-4252-4A9C-B830-2419E87AE5A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "F9085056-3BE9-4309-9601-9CA0569BC215", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.4:rc1:*:*:*:*:*:*", "matchCriteriaId": "D8432455-9064-479F-B060-BF2A74ECC3EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "9E8EF2D7-371B-4268-989E-25225CC1F7B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "ABAC4CE9-1CFA-4279-B0CE-18F3C6FB9AB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E16E37A0-F739-4EEE-A1BB-EBC558C62767", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "DF0E2562-D0FC-404C-B725-617AEEF20AB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "C831EC2A-C99D-4FB1-8E5C-2FF685792F2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "F37C4158-6C4E-448D-929B-288480748289", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "6BBA9D27-E3DC-45CE-B56B-2C6781AA6A16", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.11:rc1:*:*:*:*:*:*", "matchCriteriaId": "14CD1CCD-DFF2-4813-B56F-EA1C78AA818E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.11:rc2:*:*:*:*:*:*", "matchCriteriaId": "4499411B-C92E-47F3-A6F2-8C9011B1CBCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "57325096-F4D8-4146-A6FD-93219F2C72D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.14:rc1:*:*:*:*:*:*", "matchCriteriaId": "9684FD88-7422-4272-B9BC-D8638B1AA0B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "648639A2-26C4-4EDA-A982-25D400836696", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "4F9F6FF8-8B88-4A02-B23A-0CADA8CE316E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.16:rc1:*:*:*:*:*:*", "matchCriteriaId": "37DE011D-1C1B-46AC-9265-F82693CE3C9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.16:rc2:*:*:*:*:*:*", "matchCriteriaId": "790BF14A-0193-4A5C-802B-D82200B22342", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B8FE4BCF-9AE7-4F41-BA84-E9537CC1EBE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F25B0D15-7C09-4BBB-AC84-A1898F448DB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F259057F-3720-45D8-91B4-70A11B759794", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "A106C460-4CE2-4AC3-B2FD-310F05507511", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "3E119FF9-2AD3-450D-8BBF-C6DD063246EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "759221D5-FC37-446D-9628-233B8D0B9120", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F82D4812-0429-42D4-BD27-C76CB9E7C368", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8FE11D6-8C0A-450E-B6DA-3AFE04D82232", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "5D1FBCC8-4637-4A67-BFFD-C052C3C03C12", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "F7307E10-9FA5-4940-B837-7936384F61DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "3D0DC9D6-D4D6-46CB-98DA-F4FC1835B6B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBBD0747-F3FF-46D8-A3C4-8268E37BC5AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.7:rc1:*:*:*:*:*:*", "matchCriteriaId": "3F759F27-008E-47FB-AC0A-EF11DA19918E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.7:rc2:*:*:*:*:*:*", "matchCriteriaId": "D15C82BA-BD1F-4A19-A907-E6C30042F537", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "2E802481-C8BD-4218-8CDC-5DB112DA946C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:rc1:*:*:*:*:*:*", "matchCriteriaId": "0004AADE-1652-4242-A97D-E9818FE03CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:rc2:*:*:*:*:*:*", "matchCriteriaId": "543E9C91-60FE-43AE-9B94-08DD730BA814", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisknow:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "FF81215F-0DD3-48FC-BA1C-19E42FCD47B5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:digium:s800i:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "565444DE-F67C-4B6E-AC1E-92FC0D8A87CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:digium:s800i:1.3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "80E356B2-4AEA-4532-A6F8-13B814BEB2C8", "vulnerable": true }, { "criteria": "cpe:2.3:h:digium:s800i:1.3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "60F261AB-3172-4245-8090-744294A0D08A", "vulnerable": true }, { "criteria": "cpe:2.3:h:digium:s800i:1.3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "A3DD6B08-D77D-4275-8F91-2CA47FF6E363", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:a:-:business:*:*:*:*:*", "matchCriteriaId": "B1868709-03F9-47AA-A196-367D783C62BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b:-:business:*:*:*:*:*", "matchCriteriaId": "564A4529-997D-4615-BED8-AE3FB159689A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.1.3.2:-:business:*:*:*:*:*", "matchCriteriaId": "FE9D66C4-F49D-4EC4-B5A9-24F28726A9B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.1.3.3:-:business:*:*:*:*:*", "matchCriteriaId": "BEFA5054-D5F9-4D07-9A66-D7AAD6953F5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.2.0:-:business:*:*:*:*:*", "matchCriteriaId": "D110DCEB-F2F9-4600-B49F-22952C71B785", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.2.1:-:business:*:*:*:*:*", "matchCriteriaId": "3333A119-D92F-433C-BF5D-0037199256C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.3.1:-:business:*:*:*:*:*", "matchCriteriaId": "19C44C33-EADA-48FD-A634-8066A003AFD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.3.2:-:business:*:*:*:*:*", "matchCriteriaId": "294A2BA2-26EB-40AD-B861-7FA9043CD097", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.3.3:-:business:*:*:*:*:*", "matchCriteriaId": "4FAC61AF-BDF2-4397-A8F8-9D9155836E4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.3.4:-:business:*:*:*:*:*", "matchCriteriaId": "33DE61C2-8C6A-4CD3-8D56-E70C4356CD50", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.3.5:-:business:*:*:*:*:*", "matchCriteriaId": "EECB5F75-BCE2-4777-933E-25EB5657750C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.3.6:-:business:*:*:*:*:*", "matchCriteriaId": "B5D51557-3E67-4C9A-9753-472D13FCA5C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.5.0:-:business:*:*:*:*:*", "matchCriteriaId": "C063FCFA-B1C3-4ACB-B9E7-B3FC973FD898", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.5.1:-:business:*:*:*:*:*", "matchCriteriaId": "761DB3A3-1540-4976-AEB2-F8E45CCCC5E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.5.2:-:business:*:*:*:*:*", "matchCriteriaId": "B53CD2C1-9BF0-42F9-B3E3-2C9915E531C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.5.3:-:business:*:*:*:*:*", "matchCriteriaId": "947F58B8-21AF-460B-8203-D2605A1F91D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c:-:business:*:*:*:*:*", "matchCriteriaId": "7CD989BE-8FA0-4EDB-8442-C2E12BD01D27", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.2.3:-:business:*:*:*:*:*", "matchCriteriaId": "3FA908BA-BEF8-44A5-AC95-E7CF020D0C94", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.0:-:business:*:*:*:*:*", "matchCriteriaId": "78E8936C-033B-49E6-BB39-D5BBBC80EB55", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Asterisk Open Source 1.2.x before 1.2.35, 1.4.x before 1.4.26.3, 1.6.0.x before 1.6.0.17, and 1.6.1.x before 1.6.1.9; Business Edition A.x.x, B.x.x before B.2.5.12, C.2.x.x before C.2.4.5, and C.3.x.x before C.3.2.2; AsteriskNOW 1.5; and s800i 1.3.x before 1.3.0.5 generate different error messages depending on whether a SIP username is valid, which allows remote attackers to enumerate valid usernames via multiple crafted REGISTER messages with inconsistent usernames in the URI in the To header and the Digest in the Authorization header." }, { "lang": "es", "value": "Asterisk Open Source versi\u00f3n 1.2.x anterior a 1.2.35, versi\u00f3n 1.4.x anterior a 1.4.26.3, versi\u00f3n 1.6.0.x anterior a 1.6.0.17 y versi\u00f3n 1.6.1.x anterior a 1.6.1.9; Business Edition versi\u00f3n A.x.x, versi\u00f3n B.x.x anteriores a B.2.5.12, versi\u00f3n C.2.x.x anterior a C.2.4.5 y versi\u00f3n C.3.x.x anterior a C.3.2.2; AsteriskNOW versi\u00f3n 1.5; y s800i versi\u00f3n 1.3.x anterior a 1.3.0.5, causan diferentes mensajes de error dependiendo de si un nombre de usuario SIP sea v\u00e1lido, lo que permite a los atacantes remotos enumerar nombres de usuario v\u00e1lidos mediante m\u00faltiples mensajes de REGISTER creados con nombres de usuario inconsistentes en el URI en el encabezado To y el Digest en el encabezado Authorization." } ], "id": "CVE-2009-3727", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-11-10T18:30:00.250", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2009-008.html" }, { "source": "secalert@redhat.com", "url": "http://osvdb.org/59697" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37265" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/37479" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/37677" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2009/dsa-1952" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/36924" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1023133" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=523277" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533137" }, { "source": "secalert@redhat.com", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00789.html" }, { "source": "secalert@redhat.com", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00838.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2009-008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/59697" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37265" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37479" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37677" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2009/dsa-1952" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/36924" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1023133" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=523277" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533137" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00789.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00838.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-02-22 00:29
Modified
2024-11-21 04:11
Severity ?
Summary
An issue was discovered in Asterisk through 13.19.1, 14.x through 14.7.5, and 15.x through 15.2.1, and Certified Asterisk through 13.18-cert2. res_pjsip allows remote authenticated users to crash Asterisk (segmentation fault) by sending a number of SIP INVITE messages on a TCP or TLS connection and then suddenly closing the connection.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digium | asterisk | * | |
digium | asterisk | * | |
digium | asterisk | 13.19.1 | |
digium | certified_asterisk | * | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "2BBC6235-486B-46AE-96C1-A8F5B68A1D96", "versionEndIncluding": "14.7.5", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "D63485A9-4464-49C7-ACF8-826303D8C152", "versionEndIncluding": "15.2.1", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "22A0ED4E-446A-4315-BE3A-8647F0ECC624", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "56E4037E-1F6F-4E1A-8549-38219F0A8E91", "versionEndIncluding": "13.18", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Asterisk through 13.19.1, 14.x through 14.7.5, and 15.x through 15.2.1, and Certified Asterisk through 13.18-cert2. res_pjsip allows remote authenticated users to crash Asterisk (segmentation fault) by sending a number of SIP INVITE messages on a TCP or TLS connection and then suddenly closing the connection." }, { "lang": "es", "value": "Se ha descubierto un problema en Asterisk hasta la versi\u00f3n 13.19.1, versiones 14.x hasta la 14.7.5 y versiones 15.x hasta la 15.2.1; as\u00ed como Certified Asterisk hasta la versi\u00f3n 13.18-cert2. res_pjsip permite que usuarios remotos autenticados provoquen el cierre inesperado de Asterisk (fallo de segmentaci\u00f3n) mediante el env\u00edo de mensajes SIP INVITE en una conexi\u00f3n TCP o TLS para despu\u00e9s cerrar la conexi\u00f3n repentinamente." } ], "id": "CVE-2018-7286", "lastModified": "2024-11-21T04:11:56.600", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-22T00:29:01.110", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2018-005.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103129" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040417" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27618" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4320" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/44181/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2018-005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103129" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040417" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27618" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4320" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/44181/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-02-18 20:15
Modified
2024-11-21 05:28
Severity ?
Summary
A buffer overflow in res_pjsip_diversion.c in Sangoma Asterisk versions 13.38.1, 16.15.1, 17.9.1, and 18.1.1 allows remote attacker to crash Asterisk by deliberately misusing SIP 181 responses.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E99E69F-264A-4AD2-B507-02486117FA1C", "versionEndIncluding": "13.38.1", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0F7194B-B22A-4A28-98D2-5565442D8EF9", "versionEndIncluding": "16.15.1", "versionStartIncluding": "16.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B6714BD-DBC8-4F8D-A7C9-C8A93FE7A73C", "versionEndIncluding": "17.9.1", "versionStartIncluding": "17.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8DFA54E-1555-4438-AAD3-DE033F33147F", "versionEndIncluding": "18.1.1", "versionStartIncluding": "18.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow in res_pjsip_diversion.c in Sangoma Asterisk versions 13.38.1, 16.15.1, 17.9.1, and 18.1.1 allows remote attacker to crash Asterisk by deliberately misusing SIP 181 responses." }, { "lang": "es", "value": "Un desbordamiento del b\u00fafer en el archivo res_pjsip_diversion.c en Sangoma Asterisk versiones 13.38.1, 16.15.1, 17.9.1 y 18.1.1, permite a un atacante remoto bloquear Asterisk al hacer un uso inapropiado deliberadamente de las respuestas SIP 181" } ], "id": "CVE-2020-35776", "lastModified": "2024-11-21T05:28:03.670", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-18T20:15:12.447", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/161470/Asterisk-Project-Security-Advisory-AST-2021-001.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Feb/57" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/AST-2021-001.html" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://issues.asterisk.org/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-29227" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/161470/Asterisk-Project-Security-Advisory-AST-2021-001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Feb/57" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/AST-2021-001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://issues.asterisk.org/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-29227" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-07-09 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
Double free vulnerability in apps/app_voicemail.c in Asterisk Open Source 1.8.x before 1.8.13.1 and 10.x before 10.5.2, Certified Asterisk 1.8.11-certx before 1.8.11-cert4, and Asterisk Digiumphones 10.x.x-digiumphones before 10.5.2-digiumphones allows remote authenticated users to cause a denial of service (daemon crash) by establishing multiple voicemail sessions and accessing both the Urgent mailbox and the INBOX mailbox.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6344E43-E8AA-4340-B3A7-72F5D6A5D184", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "4C170C1C-909D-4439-91B5-DB1A9CD150C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EE821BE5-B1D3-4854-A700-3A83E5F15724", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "149C57CA-0B4B-4220-87FC-432418D1C393", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "035595D5-BBEC-4D85-AD7A-A2C932D2BA70", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "6DAF5655-F09F-47F8-AFA6-4B95F77A57F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F8E001D8-0A7B-4FDD-88E3-E124ED32B81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9D5CFFBD-785F-4417-A54A-F3565FD6E736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "D30EF999-92D1-4B19-8E32-1E4B35DE4EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "A67D156B-9C43-444F-ADEC-B21D99D1433C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "893EB152-6444-43DB-8714-9735354C873A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8447EE7-A834-41D7-9204-07BD3752870C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C04F2C9-5672-42F2-B664-A3EE4C954C29", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "33465668-4C91-4619-960A-D26D77853E53", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "CAD08674-0B44-44EA-940B-6812E2D5077D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "EEE87710-A129-43AA-BA08-8001848975FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F582C6E-5DA0-4D72-A40E-66BDBC5CF2B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CEBB8-01B3-4A05-AFE8-37A143C9833E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "522733A7-E89E-4BFD-AC93-D6882636E880", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "2FAC47DD-B613-43E4-B9BF-6120B81D9789", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "86D20CB5-60E8-405E-B387-CF80C7DA5E07", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "71AB5A01-5961-4053-9111-CF32C6473A00", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*", "matchCriteriaId": "77D8E1DC-041F-4B87-AF9A-E0EC4D6A4BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7CCCB892-30CE-4BEF-904E-5D957F94D0EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "F156798F-F2EF-4366-B17E-03165AB437D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "9EFBB9A6-DD1D-436E-919F-74A3E4F40396", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "054E34C8-B6A5-48C7-938E-D3C268E0E8BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*", "matchCriteriaId": "1DCECA72-533A-4A95-AB19-20C5F09A1B01", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*", "matchCriteriaId": "0E2309F8-AFEE-4150-99D1-BA606432ED73", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*", "matchCriteriaId": "7785F282-BFA0-400A-8398-872ACCA4BF37", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1278D3FB-78C6-4F7D-A845-0A93D4F6E2B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "C00A6EFB-A848-46D3-AAD7-FD8140007E42", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "CB6E3972-5C53-4B6D-BFE1-67E1122EA013", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "048617A0-A783-4519-A947-35220D4CD786", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "DD493A41-E686-444C-A34E-412804510F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "87D25FD6-CC3A-4AB0-B7B1-67D07386F99D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C402E9E-09CC-4EFA-AC27-156437B05B22", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C8A41F9C-D2F4-47A9-80CD-2B1BF6B0CB63", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "627FF5B9-E5A8-4DBC-A891-B175011E72A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6146EB2E-BA32-4408-B10B-A711EC39C580", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "1C863324-05AE-4FCA-BD2E-39040A468DCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A85F51E7-0AAE-4F3B-9F90-BD2E31255822", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "315FB0D4-D4A4-4369-BFB8-F2CAEB429015", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "DC74D6C5-F410-4B68-AF92-056B727193A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "B70911F8-A526-4600-8198-03FF4CCB28DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA60A9C9-C2EF-4971-BEFB-FF687DAEF2F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "BAFB22FA-CC24-4AFE-AC83-2D044563F7CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "00F3EB0D-7C63-46B5-BA95-8486B9716C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "00C1BF3B-7593-478D-9AAA-153901C70286", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "5F86406A-0936-4A06-88FB-4137A64498EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "672CE4C0-EBD6-470B-937E-810FF1C4CDBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "88DB1105-74D8-4312-9D02-D1E21F2E785C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "404C0557-6229-4D90-BFDD-54AFFCCE6A19", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6D1D26CC-891F-4396-B7D7-30D712829E71", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F25B61EA-F4D1-452A-9D96-B8DFDD719B0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9324AB96-EC99-4F04-A0A9-00F936C86EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "BDB6BBCA-47CE-49B8-9706-AFDE4BE46550", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "8BFF65E2-692B-4C39-88FC-6DED8D9A7258", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E8AE686-B618-4B0D-BD27-1F96295E964D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E9751C0A-84F5-4A43-8282-12A9DE559569", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F67E2694-F6F1-482C-91F2-D9FD856EA31B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "5E2D53AA-8D50-445F-9500-2F580F260DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "8880AE7C-3E44-4B76-B500-E93868D4CF5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7C94269D-A271-42AC-A44C-102C814E564B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E7E5B826-D3D5-4D2D-BB4D-2C1BEDE92456", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asteriske:1.8.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "5B9023E8-DB6F-4DE2-BB1E-D941BE279477", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asteriske:1.8.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "DF6135C4-7930-4DD5-80CD-4DC7F53956D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert:*:*:*:*:*:*", "matchCriteriaId": "C63C46CC-02E2-40AF-8281-F2FB5D89823A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert1:*:*:*:*:*:*", "matchCriteriaId": "71BAF2A7-024D-475A-88C0-0F5ADE3CA286", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "687ED3CE-67C4-410D-8AF4-C769015598F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "30E918CD-89C4-42DA-9709-E50E0A3FA736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "DA57FA15-D0D7-4A97-9C25-6F6566940098", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "A1C45300-A2CF-40E7-AB67-23DC24C31A1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "958081DC-1D77-45CD-A940-C7A1AB42C7BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "298A879D-4F65-4523-A752-D17C4F81B822", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "37AB07BE-54C4-4972-A05F-D1E2CF4363CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBC63564-A84E-463D-8312-DDF1C6B7796F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "62A0906E-B631-4F3A-9ABC-9A43A43220BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "C6314ADA-2849-416D-966E-C01C322EF904", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "8B6CB1DD-614A-4B3D-99AE-9B1341427024", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "CC95B04F-3746-4F1C-8428-A1FA10253E14", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "20819080-E0AB-4879-B4CF-A154D6F7EF6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C6C45753-E2CC-4F7C-B8DA-3D8CF255EA22", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5A080197-D6AA-4FDC-888E-51D1C8251E34", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "1F08D930-D4C1-4C63-875C-171C46AE97C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "1AA43D7D-AEAD-47CB-BFA5-B73004A1A7A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "B5ED5F6F-166D-4610-8939-A33AD45F1ADE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D40002A-564E-425C-BA2A-7C4A8F8DAFD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "521C4DB2-7127-4BA9-94FC-AB0E9E06FE2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "8C905DC1-8AB8-4D83-BB5B-FA4DABC58229", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "ECC74B5D-97A1-46FF-AFA3-5D5E4A0BF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "F2D98C7C-94A8-4348-AF22-04A41FB6F8EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "85D39A99-E9A6-4860-BC61-56CA2FC3238B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "845DA0A4-1983-4E82-99C8-B7FBF47C632E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "5A63FBB7-F1CF-4603-848F-980742D2ED36", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "10B2084F-3AF4-4008-899C-6C1E43715201", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "217C13A5-9F8A-4392-858F-2FC88B03EB0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "6B282462-900C-492E-98DE-65364E62F5E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "687784F0-9ACC-435D-81F9-1E1B0F61010C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "9D7D020C-FE32-408B-BE37-58835FD3D95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "39B7938F-7370-4F67-B0CD-1C14DE2E4E7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC587195-5973-423B-8BF9-3E0B27363B76", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert:*:*:*:*:*:*", "matchCriteriaId": "C63C46CC-02E2-40AF-8281-F2FB5D89823A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert1:*:*:*:*:*:*", "matchCriteriaId": "71BAF2A7-024D-475A-88C0-0F5ADE3CA286", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert2:*:*:*:*:*:*", "matchCriteriaId": "82F91FE8-C320-466B-AF08-67319A00A2BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert3:*:*:*:*:*:*", "matchCriteriaId": "DCFF0E1C-B455-4C18-8AA1-10408234327B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "6372EEEA-2759-4B6A-BD03-D84DC956E80E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta1:digiumphones:*:*:*:*:*", "matchCriteriaId": "26DF0C53-9F6A-4233-B163-AEC1F9886387", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta2:digiumphones:*:*:*:*:*", "matchCriteriaId": "79A063D7-553F-486F-9079-D95C8047B05E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc1:digiumphones:*:*:*:*:*", "matchCriteriaId": "B606D854-FC06-4314-AD24-FEEA3796A0AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc2:digiumphones:*:*:*:*:*", "matchCriteriaId": "DEBB0786-D912-48D1-BC63-E0F87E078154", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc3:digiumphones:*:*:*:*:*", "matchCriteriaId": "1C39DD70-1220-4CC6-95B4-CE18CA5787CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "B0005F0B-9C87-4160-9416-A7C136FCD5AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc1:digiumphones:*:*:*:*:*", "matchCriteriaId": "12073B6A-14B1-490B-B267-A68194C68BDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc2:digiumphones:*:*:*:*:*", "matchCriteriaId": "198C92F2-8268-4045-B297-17E0D1F9726E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "5D3A3C00-EA83-4EF4-8681-DB5616132607", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc1:digiumphones:*:*:*:*:*", "matchCriteriaId": "5FE59F0F-44B0-4940-8368-F360EE610114", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc2:digiumphones:*:*:*:*:*", "matchCriteriaId": "3647F0E3-196F-486B-9BAB-75ED24A055ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc3:digiumphones:*:*:*:*:*", "matchCriteriaId": "1FBC4A5F-FB16-42B2-9689-25F8B3D0F521", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc4:digiumphones:*:*:*:*:*", "matchCriteriaId": "B788D6E2-78E8-4DE1-81F5-40D52263E7F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "51358F60-4D6C-4DBA-86B0-E12C48A67456", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc2:digiumphones:*:*:*:*:*", "matchCriteriaId": "D51C9952-97F4-4326-8F7D-34579D3686AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc3:digiumphones:*:*:*:*:*", "matchCriteriaId": "3711A75C-AF87-4A5C-8B35-1CF834C12D2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "E7FFD09D-21A3-4E98-B1FA-C7A16C243D91", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc1:digiumphones:*:*:*:*:*", "matchCriteriaId": "FAC6591A-BC5A-4CA9-90BC-0B686F74127B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc2:digiumphones:*:*:*:*:*", "matchCriteriaId": "01BAF29D-8679-40F3-AB6C-DA5C3787271C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "B42229C3-B18E-4D50-9B98-202CB1805CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc1:digiumphones:*:*:*:*:*", "matchCriteriaId": "15DF192B-A8D5-4FCC-B469-505A8FA11D00", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc2:digiumphones:*:*:*:*:*", "matchCriteriaId": "D24E01F7-604D-4D05-B698-3BDEF7B69EF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.1:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "A54A74F4-8A6C-4090-88C2-8AB5A606C59B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Double free vulnerability in apps/app_voicemail.c in Asterisk Open Source 1.8.x before 1.8.13.1 and 10.x before 10.5.2, Certified Asterisk 1.8.11-certx before 1.8.11-cert4, and Asterisk Digiumphones 10.x.x-digiumphones before 10.5.2-digiumphones allows remote authenticated users to cause a denial of service (daemon crash) by establishing multiple voicemail sessions and accessing both the Urgent mailbox and the INBOX mailbox." }, { "lang": "es", "value": "vulnerabilidad de doble liberaci\u00f3n en apps/app_voicemail.c en Asterisk Open Source v1.8.x anteriores v1.8.13.1 y v10.x anteriores a v10.5.2, Certified Asterisk v1.8.11-certx anteriores a v1.8.11-cert4, y Asterisk Digiumphones v10.x.x-digiumphones anteriores a v10.5.2-digiumphones permite a usuarios autenticados remotos a provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio) debido al establecimiento de m\u00faltiples sesiones correo de voz y accediendo a buz\u00f3n urgente (Urgent) a trav\u00e9s del buz\u00f3n de entrada INBOX." } ], "id": "CVE-2012-3812", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-07-09T22:55:01.260", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2012-011.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/50687" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/50756" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2012/dsa-2550" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/54317" }, { "source": "cve@mitre.org", "url": "https://issues.asterisk.org/jira/browse/ASTERISK-20052" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2012-011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/50687" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/50756" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2550" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/54317" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.asterisk.org/jira/browse/ASTERISK-20052" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-14 20:15
Modified
2024-11-21 08:33
Severity ?
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk prior to versions 18.20.1, 20.5.1, and 21.0.1, as well as certified-asterisk prior to 18.9-cert6, it is possible to read any arbitrary file even when the `live_dangerously` is not enabled. This allows arbitrary files to be read. Asterisk versions 18.20.1, 20.5.1, and 21.0.1, as well as certified-asterisk prior to 18.9-cert6, contain a fix for this issue.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "A49E9157-3440-47C5-B730-B1F3BE7240C9", "versionEndExcluding": "18.20.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCA06EB6-E31A-43B2-A750-186255114B8F", "versionEndExcluding": "20.5.1", "versionStartIncluding": "19.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:21.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3E690E3-3E92-42ED-87DD-1C6B838A3FF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:13.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "2AFE2011-05AA-45A6-A561-65C6C664DA7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert1:*:*:*:*:*:*", "matchCriteriaId": "C1117AA4-CE6B-479B-9995-A9F71C430663", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert1-rc1:*:*:*:*:*:*", "matchCriteriaId": "775041BD-5C86-42B6-8B34-E1D5171B3D87", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert1-rc2:*:*:*:*:*:*", "matchCriteriaId": "55EC2877-2FF5-4777-B118-E764A94BCE56", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert1-rc3:*:*:*:*:*:*", "matchCriteriaId": "EB0392C9-A5E9-4D71-8B8D-63FB96E055A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert1-rc4:*:*:*:*:*:*", "matchCriteriaId": "09AF962D-D4BB-40BA-B435-A59E4402931C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert2:*:*:*:*:*:*", "matchCriteriaId": "559D1063-7F37-44F8-B5C6-94758B675FDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert3:*:*:*:*:*:*", "matchCriteriaId": "185B2B4B-B246-4379-906B-9BDA7CDD4400", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:13.13.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "73D3592D-3CE5-4462-9FE8-4BCB54E74B5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:13.13.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "B3CCE9E0-5DC4-43A2-96DB-9ABEA60EC157", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:-:*:*:*:*:*:*", "matchCriteriaId": "1EAD713A-CBA2-40C3-9DE3-5366827F18C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert1:*:*:*:*:*:*", "matchCriteriaId": "A5F5A8B7-29C9-403C-9561-7B3E96F9FCA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert10:*:*:*:*:*:*", "matchCriteriaId": "F9B96A53-2263-463C-9CCA-0F29865FE500", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert11:*:*:*:*:*:*", "matchCriteriaId": "A53049F1-8551-453E-834A-68826A7AA959", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert12:*:*:*:*:*:*", "matchCriteriaId": "B224A4E9-4B6B-4187-B0D6-E4BAE2637960", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert2:*:*:*:*:*:*", "matchCriteriaId": "9501DBFF-516D-4F26-BBF6-1B453EE2A630", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert3:*:*:*:*:*:*", "matchCriteriaId": "9D3E9AC0-C0B4-4E87-8D48-2B688D28B678", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert4:*:*:*:*:*:*", "matchCriteriaId": "1A8628F6-F8D1-4C0C-BD89-8E2EEF19A5F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert5:*:*:*:*:*:*", "matchCriteriaId": "E27A6FD1-9321-4C9E-B32B-D6330CD3DC92", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert6:*:*:*:*:*:*", "matchCriteriaId": "B6BF5EDB-9D17-453D-A22E-FDDC4DCDD85B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert7:*:*:*:*:*:*", "matchCriteriaId": "4C75A21E-5D05-434B-93DE-8DAC4DD3E587", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert8:*:*:*:*:*:*", "matchCriteriaId": "1D725758-C9F5-4DB2-8C45-CC052518D3FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert9:*:*:*:*:*:*", "matchCriteriaId": "B5E2AECC-B681-4EA5-9DE5-2086BB37A5F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:18.9:cert1:*:*:*:*:*:*", "matchCriteriaId": "79EEB5E5-B79E-454B-8DCD-3272BA337A9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:18.9:cert2:*:*:*:*:*:*", "matchCriteriaId": "892BAE5D-A64E-4FE0-9A99-8C07F342A042", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:18.9:cert3:*:*:*:*:*:*", "matchCriteriaId": "1A716A45-7075-4CA6-9EF5-2DD088248A5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:18.9:cert4:*:*:*:*:*:*", "matchCriteriaId": "80EFA05B-E22D-49CE-BDD6-5C7123F1C12B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:18.9:cert5:*:*:*:*:*:*", "matchCriteriaId": "20FD475F-2B46-47C9-B535-1561E29CB7A1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk prior to versions 18.20.1, 20.5.1, and 21.0.1, as well as certified-asterisk prior to 18.9-cert6, it is possible to read any arbitrary file even when the `live_dangerously` is not enabled. This allows arbitrary files to be read. Asterisk versions 18.20.1, 20.5.1, and 21.0.1, as well as certified-asterisk prior to 18.9-cert6, contain a fix for this issue." }, { "lang": "es", "value": "Asterisk es un conjunto de herramientas de telefon\u00eda y centralita privada de c\u00f3digo abierto. En Asterisk anterior a las versiones 18.20.1, 20.5.1 y 21.0.1, as\u00ed como en Certified-Asterisco anterior a 18.9-cert6, es posible leer cualquier archivo arbitrario incluso cuando `live_dangerfully` no est\u00e1 habilitado. Esto permite leer archivos arbitrarios. Las versiones de Asterisk 18.20.1, 20.5.1 y 21.0.1, as\u00ed como el asterisco certificado anterior a 18.9-cert6, contienen una soluci\u00f3n para este problema." } ], "id": "CVE-2023-49294", "lastModified": "2024-11-21T08:33:12.447", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-14T20:15:52.730", "references": [ { "source": "security-advisories@github.com", "tags": [ "Product" ], "url": "https://github.com/asterisk/asterisk/blob/master/main/manager.c#L3757" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/asterisk/asterisk/commit/424be345639d75c6cb7d0bd2da5f0f407dbd0bd5" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-8857-hfmw-vg8f" }, { "source": "security-advisories@github.com", "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://github.com/asterisk/asterisk/blob/master/main/manager.c#L3757" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/asterisk/asterisk/commit/424be345639d75c6cb7d0bd2da5f0f407dbd0bd5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-8857-hfmw-vg8f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-04-27 00:55
Modified
2025-04-11 00:51
Severity ?
Summary
manager.c in the Manager Interface in Asterisk Open Source 1.4.x before 1.4.40.1, 1.6.1.x before 1.6.1.25, 1.6.2.x before 1.6.2.17.3, and 1.8.x before 1.8.3.3 and Asterisk Business Edition C.x.x before C.3.6.4 does not properly check for the system privilege, which allows remote authenticated users to execute arbitrary commands via an Originate action that has an Async header in conjunction with an Application header.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E56DB29-571D-4615-B347-38CF4590E463", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "FC1188DA-6C27-48D2-9CE7-74D77B24EE9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "A93B8F91-5C56-44DE-AE29-8468E853759F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "BF7F4D02-7C8E-403C-A53E-A5F8C07F33A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "D85031A3-3444-4650-905D-721F1EBAA24F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "6F0AC2B3-6E8A-4B26-8A6C-792D9E5072C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "2BC8D6D4-A389-4A78-8DA8-351A9CB896E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "5E979AC4-58EA-4297-9F90-350924BBE440", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "D9154EDB-CAE6-4BB0-8D02-9EC2B81D93C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "A432B0A7-F158-4B9C-97F6-6A29DB13EAFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "687C67CB-46AF-40C2-8A02-081C7F78568A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "6E8D6EC0-A61E-4DBC-A0C7-864E9C4BDA1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EF7F65A-45FD-4586-901E-49B057100BB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "300F158E-ED27-46C8-85E4-AA0AA6B201DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "FB6F04C0-3226-4D2C-97A3-39999483C62C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "30685A20-963A-48D4-B7D7-2C11C2C812AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "C54C3AAC-4D5D-4661-86AB-6849982E8C67", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "6F847916-89F1-4AA6-973D-6002C8B54EE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "5359815E-671A-4DFD-9E99-8CF903A03C84", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "E2EFBC9E-4DCA-43CB-93EB-6807E2383A98", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.18:*:*:*:*:*:*:*", "matchCriteriaId": "98755B1B-CAD5-4AC5-8571-52E67C3A8274", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:*:*:*:*:*:*:*", "matchCriteriaId": "C9D8C8FE-3D09-4F60-AD03-9D4439942141", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc1:*:*:*:*:*:*", "matchCriteriaId": "902FBE4B-5237-43CD-8EB6-D2CAC0F30879", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc2:*:*:*:*:*:*", "matchCriteriaId": "708DCACA-49EC-468D-81EC-CE5367F8A164", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc3:*:*:*:*:*:*", "matchCriteriaId": "BA9E3314-7D23-414C-8187-16D807410B62", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc4:*:*:*:*:*:*", "matchCriteriaId": "D824ED7B-BAB6-4C0F-A6B0-A75AB072EC0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A01CE63-F834-48B2-826D-2DAD1B4AE8C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "88B9CC9D-3DC2-4674-BA52-4C6D4E2056C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:*:*:*:*:*:*:*", "matchCriteriaId": "43F1849F-1230-45E7-B6A3-D6FC72EB0F11", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc1:*:*:*:*:*:*", "matchCriteriaId": "873C9C7E-93A3-4269-B19C-AB33A21C1AC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc2:*:*:*:*:*:*", "matchCriteriaId": "457F2112-7C5E-4953-8F4C-117925D486DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc3:*:*:*:*:*:*", "matchCriteriaId": "BD15ADD6-D7FA-441A-A9BC-487BCC15F2A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "792A8901-B7B8-40E8-9258-6338B72770FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:*:*:*:*:*:*:*", "matchCriteriaId": "0E6C8F78-0C00-45A5-8FEB-2A4BD5AC1A37", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:rc1:*:*:*:*:*:*", "matchCriteriaId": "F3E04247-C4EF-4C1B-B879-5C02986950D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:rc2:*:*:*:*:*:*", "matchCriteriaId": "5E382FC8-4001-4058-9151-05AE98B4A35E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "11FECE6B-B6A6-4DDA-9019-9A10B05EC1F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "D9813D27-0688-4989-99EB-1DC0F82D59F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:*:*:*:*:*:*:*", "matchCriteriaId": "D4333904-9D21-4149-965F-F49F0A34BD85", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc1:*:*:*:*:*:*", "matchCriteriaId": "F7180626-F0FD-46F3-AD52-5C67525C4B46", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc2:*:*:*:*:*:*", "matchCriteriaId": "85A1E3A3-C157-4F3D-9477-F63771E7F627", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc3:*:*:*:*:*:*", "matchCriteriaId": "FEE739CC-7A9C-489E-BFC0-6257129C043D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc4:*:*:*:*:*:*", "matchCriteriaId": "ADC0E947-A95A-44ED-8DED-CC769FF00569", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc5:*:*:*:*:*:*", "matchCriteriaId": "DE52BD9F-3728-455C-BC45-1A4DB926FFE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22.1:*:*:*:*:*:*:*", "matchCriteriaId": "1EF82D41-9222-42D3-ADAD-94B4F950C63F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AE9F181-A8E4-4700-A30F-211CDE251606", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:*:*:*:*:*:*:*", "matchCriteriaId": "5B10AE4B-EC2D-4D5B-B842-50F5097A0650", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc1:*:*:*:*:*:*", "matchCriteriaId": "83E854D0-17A2-473B-B7E8-41E6447C81DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc2:*:*:*:*:*:*", "matchCriteriaId": "47169133-3854-4D8F-B79E-3CC77A166EF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc3:*:*:*:*:*:*", "matchCriteriaId": "6071601F-CF37-4E66-9D6D-AFC3434C18AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc4:*:*:*:*:*:*", "matchCriteriaId": "2A575824-E005-4820-824A-4875594619E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "080C7089-5662-4A94-9842-C4A26095DA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23.2:*:*:*:*:*:*:*", "matchCriteriaId": "7AE38697-0B16-4032-9234-CA263E4A9885", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.24:*:*:*:*:*:*:*", "matchCriteriaId": "DCB18BE2-B073-429C-ABE7-B8305793DAE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.24:rc1:*:*:*:*:*:*", "matchCriteriaId": "FA7216BA-A42F-4ED8-8086-B4FA483FDAB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "CB7D2048-CD61-46C0-830B-11976B275783", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.25:*:*:*:*:*:*:*", "matchCriteriaId": "8DBA63FE-62AF-4F3D-B30C-550D17C4E35F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.25:rc1:*:*:*:*:*:*", "matchCriteriaId": "AD0A0F19-020D-4578-9023-12B0CB646D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.25.1:*:*:*:*:*:*:*", "matchCriteriaId": "96D5A1E3-FF0B-4C71-AA51-655D7106880D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:*:*:*:*:*:*:*", "matchCriteriaId": "E5D425E6-E2E5-4452-9EAA-2697C1155784", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc1:*:*:*:*:*:*", "matchCriteriaId": "9855FA26-0930-4AC9-A920-B394F6916349", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc2:*:*:*:*:*:*", "matchCriteriaId": "BBA21246-7DF4-41BC-998A-05D38FC97C8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc3:*:*:*:*:*:*", "matchCriteriaId": "EE9A7984-22C9-4296-8E44-C010E67F193D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc4:*:*:*:*:*:*", "matchCriteriaId": "51B2C42A-C252-4BD8-A908-8F30C2BF15E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc5:*:*:*:*:*:*", "matchCriteriaId": "2137CEAD-0F19-43C5-A26D-1972564FCD8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc6:*:*:*:*:*:*", "matchCriteriaId": "B7552466-B782-4F16-8561-A2A51E94FED4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26.1:*:*:*:*:*:*:*", "matchCriteriaId": "C2F8C82D-3031-4C62-89FA-3BF56EA29727", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26.2:*:*:*:*:*:*:*", "matchCriteriaId": "B3074CEA-46BD-4CAD-BF5C-10008A80E434", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6AB8988-FCC6-407A-A7D9-2F7A3A7488B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E06848DE-6EE1-4FD0-A14F-39D41B2F3E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc1:*:*:*:*:*:*", "matchCriteriaId": "CF342950-FDD7-41A9-94D5-EDF41130B61E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc2:*:*:*:*:*:*", "matchCriteriaId": "6E4543AA-3D54-4444-AD1F-381A87A89DA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc3:*:*:*:*:*:*", "matchCriteriaId": "AF3036DD-261C-4975-A01E-92CD29479588", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc4:*:*:*:*:*:*", "matchCriteriaId": "EF07C116-27DC-4875-9DCF-049E2A8EAEA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc5:*:*:*:*:*:*", "matchCriteriaId": "88FBC328-538A-4484-A342-1688D9669B9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27.1:*:*:*:*:*:*:*", "matchCriteriaId": "CBF2301E-F6EF-4D28-82EE-FA1AB8CA9E43", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.28:*:*:*:*:*:*:*", "matchCriteriaId": "A53F637C-846A-43FC-BA71-C8571648FA46", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.28:rc1:*:*:*:*:*:*", "matchCriteriaId": "E61070F4-1B6B-4814-918E-459DE5119A24", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.29:*:*:*:*:*:*:*", "matchCriteriaId": "70664E0F-09CF-42C2-A7A7-E635D022E90D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.29:rc1:*:*:*:*:*:*", "matchCriteriaId": "D1E13E1A-C2D4-4E5A-84C8-E6AF061D67C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.29.1:*:*:*:*:*:*:*", "matchCriteriaId": "7E811134-B657-4C50-9AEF-A7F68CA5577A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.30:*:*:*:*:*:*:*", "matchCriteriaId": "4C4CD101-F079-4940-AA79-886B69A7A514", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.30:rc2:*:*:*:*:*:*", "matchCriteriaId": "B7B828E9-5BE3-4E6F-8048-F2B1F2E929CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.30:rc3:*:*:*:*:*:*", "matchCriteriaId": "75BB2066-74A6-4F89-B54C-35F234DC1F03", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.31:*:*:*:*:*:*:*", "matchCriteriaId": "FE522334-BF53-4E34-949B-CD928B59A341", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.31:rc1:*:*:*:*:*:*", "matchCriteriaId": "648DEC0E-3CBC-4EA2-AF27-2C518B0762CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.31:rc2:*:*:*:*:*:*", "matchCriteriaId": "B50F4BAE-D00D-4352-B52B-BE1A9FFB6949", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.32:*:*:*:*:*:*:*", "matchCriteriaId": "E7A35508-8235-4915-8810-12B2630C82C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.32:rc1:*:*:*:*:*:*", "matchCriteriaId": "63DD4EE5-6F56-41C7-9CB4-16ADF4F63B8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.33:*:*:*:*:*:*:*", "matchCriteriaId": "2347E451-2F89-4EA6-A6E0-22BCB0C8A56E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.33:rc1:*:*:*:*:*:*", "matchCriteriaId": "A86F5360-6FE4-4EA2-9208-076E78C842A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.33:rc2:*:*:*:*:*:*", "matchCriteriaId": "3CDFA85B-17A4-4ECC-9922-F5546917B4C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.33.1:*:*:*:*:*:*:*", "matchCriteriaId": "3D7D7DB7-32A7-490E-AED2-C404D371E7C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.34:*:*:*:*:*:*:*", "matchCriteriaId": "A03632BC-CA0F-42BD-8839-A72DB146A4A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.34:rc1:*:*:*:*:*:*", "matchCriteriaId": "9DC4EF64-6A1D-47CB-AC07-48CABB612DCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.34:rc2:*:*:*:*:*:*", "matchCriteriaId": "68C00FEF-7850-48F4-8122-4211D080B508", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.35:*:*:*:*:*:*:*", "matchCriteriaId": "D3A48F07-42E1-47E9-94EA-44D20A0BAC3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.35:rc1:*:*:*:*:*:*", "matchCriteriaId": "87D16470-5892-4289-BB35-B69100BCA31E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.36:*:*:*:*:*:*:*", "matchCriteriaId": "15E71BD7-83D1-4E2B-AD40-BB6B53056C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.36:rc1:*:*:*:*:*:*", "matchCriteriaId": "87FDE2E2-5F08-43EF-BBD8-7DCCC0C98870", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.37:*:*:*:*:*:*:*", "matchCriteriaId": "347E9D8C-A372-41F2-AB48-FFCAB454C9C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.37:rc1:*:*:*:*:*:*", "matchCriteriaId": "74F67E57-1DD0-4850-8D7E-7A9748BD106C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.38:*:*:*:*:*:*:*", "matchCriteriaId": "B208C056-B567-4BEE-A9B7-AEB394341D5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.38:rc1:*:*:*:*:*:*", "matchCriteriaId": "A0C3A2D4-07A9-4D28-AC18-03523E9FF34A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.39:*:*:*:*:*:*:*", "matchCriteriaId": "E6516E0F-9F60-4D20-88D3-B9CD8DC93062", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.39:rc1:*:*:*:*:*:*", "matchCriteriaId": "22147B91-45A4-4834-AC8D-2DC17A706BEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.39.1:*:*:*:*:*:*:*", "matchCriteriaId": "677C10DE-46D8-4EF1-BF22-63F3AE37CBC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.39.2:*:*:*:*:*:*:*", "matchCriteriaId": "E299CE20-B02D-4519-AC46-BB64B1E3826A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.40:*:*:*:*:*:*:*", "matchCriteriaId": "22FD16C3-7518-4208-8C0A-043C13C14A72", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.40:rc1:*:*:*:*:*:*", "matchCriteriaId": "2461B6B9-2C93-4D84-A1EE-C07AD32A9540", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.40:rc2:*:*:*:*:*:*", "matchCriteriaId": "C8A4CE2D-FBAB-4C35-846A-5B95BBCAD6BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.40:rc3:*:*:*:*:*:*", "matchCriteriaId": "30FFB6F4-1BC7-4D4C-9C65-A66CF514E321", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1F8B700A-FACB-4BC8-9DF2-972DC63D852B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FFD31B9B-2F43-4637-BE56-47A807384BF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "E6450D6B-C907-49E6-9788-E4029C09285F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "DDB0432E-024A-4C0C-87FF-448E513D2834", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "D6A6A343-FEA2-49E5-9858-455AE3B29470", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc6:*:*:*:*:*:*", "matchCriteriaId": "D57B94E3-EA37-466C-ADC4-5180D4502FDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc7:*:*:*:*:*:*", "matchCriteriaId": "64D35A89-6B21-4770-AA0F-424C5C91A254", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc8:*:*:*:*:*:*", "matchCriteriaId": "14817302-A34A-4980-B148-AEB4B3B49BE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "61FDFA96-E62A-413B-9846-F51F1F7349EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "DA924386-49F6-4371-B975-B1473EEA12F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "B74A1B99-8901-4690-B994-1DAD3EFA5ABB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "4253C7DD-3588-4B35-B96D-C027133BE93F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "24AE11DB-16D3-42BF-BC64-E8982107D35B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "53841D77-926C-4362-BC85-BD8B6AC4391D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "F98FD6E6-EDE9-437D-B7C2-2DB65B73D230", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "4BA6CA77-D358-4623-8400-78EFC47ADB7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "B4E62DAB-45E0-4EAA-8E45-6D3757A679D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.15:rc1:*:*:*:*:*:*", "matchCriteriaId": "1355578C-B384-401A-9123-2789CBECAD0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "3491F8DB-A162-4608-B5F9-5401FE058CEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16:rc1:*:*:*:*:*:*", "matchCriteriaId": "C52730A8-D96E-46C1-8905-1D78A93E9C84", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "C6E5CD17-B14A-4BDB-BA75-261344FF6F25", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "63C8DBF5-6992-4618-BD2D-56F1F98EAE3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "EEED6C07-CFB7-44DC-9A41-9B6271942123", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:rc1:*:*:*:*:*:*", "matchCriteriaId": "0864DAF9-B7FA-4018-99F4-F2A7AA6FBBB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:rc2:*:*:*:*:*:*", "matchCriteriaId": "694B257B-E73B-4534-B316-87284FA45534", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:rc3:*:*:*:*:*:*", "matchCriteriaId": "418FD91F-014E-4529-8D72-D3FB27788EEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "D213EC93-0D4F-4BD9-9F13-9A9E705135EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17.2:*:*:*:*:*:*:*", "matchCriteriaId": "2E9D2091-B292-4D6E-A91F-58D24BD5A5E3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6344E43-E8AA-4340-B3A7-72F5D6A5D184", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "4C170C1C-909D-4439-91B5-DB1A9CD150C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EE821BE5-B1D3-4854-A700-3A83E5F15724", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "149C57CA-0B4B-4220-87FC-432418D1C393", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "035595D5-BBEC-4D85-AD7A-A2C932D2BA70", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "6DAF5655-F09F-47F8-AFA6-4B95F77A57F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F8E001D8-0A7B-4FDD-88E3-E124ED32B81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9D5CFFBD-785F-4417-A54A-F3565FD6E736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "D30EF999-92D1-4B19-8E32-1E4B35DE4EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "A67D156B-9C43-444F-ADEC-B21D99D1433C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "893EB152-6444-43DB-8714-9735354C873A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8447EE7-A834-41D7-9204-07BD3752870C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C04F2C9-5672-42F2-B664-A3EE4C954C29", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "33465668-4C91-4619-960A-D26D77853E53", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "CAD08674-0B44-44EA-940B-6812E2D5077D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "EEE87710-A129-43AA-BA08-8001848975FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F582C6E-5DA0-4D72-A40E-66BDBC5CF2B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CEBB8-01B3-4A05-AFE8-37A143C9833E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "522733A7-E89E-4BFD-AC93-D6882636E880", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "2FAC47DD-B613-43E4-B9BF-6120B81D9789", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "86D20CB5-60E8-405E-B387-CF80C7DA5E07", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "71AB5A01-5961-4053-9111-CF32C6473A00", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*", "matchCriteriaId": "77D8E1DC-041F-4B87-AF9A-E0EC4D6A4BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7CCCB892-30CE-4BEF-904E-5D957F94D0EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "F156798F-F2EF-4366-B17E-03165AB437D5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:c.1.0:beta7:business:*:*:*:*:*", "matchCriteriaId": "1C4E15BB-71AB-4936-9CA7-E844572A3953", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.0:beta8:business:*:*:*:*:*", "matchCriteriaId": "EE5823E1-5BFF-44E0-B8DD-4D994073DC1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.6:-:business:*:*:*:*:*", "matchCriteriaId": "E6C147EF-0C39-4979-A4F6-C0BE288F083F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.6.1:-:business:*:*:*:*:*", "matchCriteriaId": "0C1A8352-DE70-4D4E-BC4D-8EABE5431646", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.6.2:-:business:*:*:*:*:*", "matchCriteriaId": "615D7356-E9DD-4149-B1BE-D3C3475A8841", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.8.0:-:business:*:*:*:*:*", "matchCriteriaId": "0628E34F-1A60-416D-A29C-EA28E8CC2430", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.8.1:-:business:*:*:*:*:*", "matchCriteriaId": "5F54511A-A2A9-4038-9D7D-2283A6709DB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.2.3:-:business:*:*:*:*:*", "matchCriteriaId": "3FA908BA-BEF8-44A5-AC95-E7CF020D0C94", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.0:-:business:*:*:*:*:*", "matchCriteriaId": "78E8936C-033B-49E6-BB39-D5BBBC80EB55", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.1.0:-:business:*:*:*:*:*", "matchCriteriaId": "5D05D04F-CD6C-4A73-885C-306D7A5CC7C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.1.1:-:business:*:*:*:*:*", "matchCriteriaId": "3805B5F3-A4CD-469F-9F8A-A271A79A2B7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.2.2:-:business:*:*:*:*:*", "matchCriteriaId": "9FAEBE5E-378A-40DC-B2B9-31F6D1305BCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.2.3:-:business:*:*:*:*:*", "matchCriteriaId": "617B3FE8-39E3-41C0-9348-9507DA43DE93", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.3.2:-:business:*:*:*:*:*", "matchCriteriaId": "04AB4C82-71BB-49B7-B4F3-4E75EFB5F1A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.6.2:-:business:*:*:*:*:*", "matchCriteriaId": "78B55176-E269-411B-974A-B5D2CE8E08C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.6.3:-:business:*:*:*:*:*", "matchCriteriaId": "9BCF12B0-4B8D-499D-B5DE-FB0CD9EEC3B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B8FE4BCF-9AE7-4F41-BA84-E9537CC1EBE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F25B0D15-7C09-4BBB-AC84-A1898F448DB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F259057F-3720-45D8-91B4-70A11B759794", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "A106C460-4CE2-4AC3-B2FD-310F05507511", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "3E119FF9-2AD3-450D-8BBF-C6DD063246EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "759221D5-FC37-446D-9628-233B8D0B9120", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F82D4812-0429-42D4-BD27-C76CB9E7C368", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8FE11D6-8C0A-450E-B6DA-3AFE04D82232", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "5D1FBCC8-4637-4A67-BFFD-C052C3C03C12", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "F7307E10-9FA5-4940-B837-7936384F61DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "3D0DC9D6-D4D6-46CB-98DA-F4FC1835B6B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBBD0747-F3FF-46D8-A3C4-8268E37BC5AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.7:rc1:*:*:*:*:*:*", "matchCriteriaId": "3F759F27-008E-47FB-AC0A-EF11DA19918E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.7:rc2:*:*:*:*:*:*", "matchCriteriaId": "D15C82BA-BD1F-4A19-A907-E6C30042F537", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "2E802481-C8BD-4218-8CDC-5DB112DA946C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "D6FC8A53-E3C0-4660-BE75-2B5B8B4F8160", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "93C020CD-D0EA-4B3E-B33C-F900B08B28FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:rc1:*:*:*:*:*:*", "matchCriteriaId": "0004AADE-1652-4242-A97D-E9818FE03CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:rc2:*:*:*:*:*:*", "matchCriteriaId": "543E9C91-60FE-43AE-9B94-08DD730BA814", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:rc3:*:*:*:*:*:*", "matchCriteriaId": "252849FA-F46E-4F5A-A488-AA53574CA884", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "9EB89B4F-9546-4DF0-B69F-1B9F289BB1E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "2E254415-1D59-4A77-80FB-AE3EF10FBB32", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.12:rc1:*:*:*:*:*:*", "matchCriteriaId": "DF2407D0-C324-45C4-9FBB-4294F747DBDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "F23A36CC-9AA2-4559-946D-6D0621664342", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.13:rc1:*:*:*:*:*:*", "matchCriteriaId": "89C40652-E180-416A-B88A-E6313530E98A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "A28C2C5D-A573-4036-A600-BE28A3E417B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.15:rc2:*:*:*:*:*:*", "matchCriteriaId": "EE162390-359F-4C5D-902B-275FB1FC3EF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "4A0A3750-0D34-4FB5-B897-17CA0D0B7CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "D11BE58D-5B7E-4BB5-988A-7FC2E4B92C4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "22631AE6-5DA1-46C6-A239-C232DA0D0E7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.18:rc1:*:*:*:*:*:*", "matchCriteriaId": "9F5CB8CC-4CC1-4A1B-8AD1-C876D1BC80EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.18:rc2:*:*:*:*:*:*", "matchCriteriaId": "8591DB43-EAA0-4D58-BA23-EAD916DEA3DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "4E4747F8-1AFC-4AEF-82D8-D6604FB5222E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.19:rc1:*:*:*:*:*:*", "matchCriteriaId": "B82172C9-EA5B-4FC9-A445-0A297AE56FF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.19:rc2:*:*:*:*:*:*", "matchCriteriaId": "0C71CDAB-A299-4F1D-942D-851C899E63BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.19:rc3:*:*:*:*:*:*", "matchCriteriaId": "E2FA9AB9-4C83-45A3-9772-3A16030DBF1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "A88C639A-9229-4D99-9087-1B0B95539BD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.20:rc1:*:*:*:*:*:*", "matchCriteriaId": "0B7DE987-7351-495A-8776-37E6B7BF0C0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.20:rc2:*:*:*:*:*:*", "matchCriteriaId": "CB5823CC-941F-47AB-AD1F-325181D40E60", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "712AF374-846D-4F21-91C4-1BA9AB33E46D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "E431AF4E-C6A8-424F-9205-01F5FDFB3306", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "52BE29C5-C2C3-4414-A8E1-4D4D926F6E65", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "87BBDF0F-7A23-48BA-98BC-0EDEDD2CDDF8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "manager.c in the Manager Interface in Asterisk Open Source 1.4.x before 1.4.40.1, 1.6.1.x before 1.6.1.25, 1.6.2.x before 1.6.2.17.3, and 1.8.x before 1.8.3.3 and Asterisk Business Edition C.x.x before C.3.6.4 does not properly check for the system privilege, which allows remote authenticated users to execute arbitrary commands via an Originate action that has an Async header in conjunction with an Application header." }, { "lang": "es", "value": "manager.c en la interfaz de administrador de Asterisk Open Source v1.4.x antes de v1.4.40.1, v1.6.1.x antes de v1.6.1.25, v1.6.2.x antes v1.6.2.17.3, y v1.8.x antes de v1.8.3.3 y Asterisk Business Edition Cxx antes vC.3.6.4 no comprueba correctamente el privilegio del sistema, lo que permite a usuarios remotos autenticados ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una acci\u00f3n \"Originate\" que tiene un encabezado Async en relaci\u00f3n con un encabezado Application." } ], "id": "CVE-2011-1599", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-04-27T00:55:04.820", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://downloads.digium.com/pub/security/AST-2011-006.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058922.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/059702.html" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2011/04/22/6" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/44197" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/44529" }, { "source": "secalert@redhat.com", "url": "http://securitytracker.com/id?1025433" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2011/dsa-2225" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/47537" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/1086" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/1107" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/1188" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.digium.com/pub/security/AST-2011-006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058922.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/059702.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2011/04/22/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/44197" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/44529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1025433" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2225" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/47537" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/1086" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/1107" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/1188" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-09-02 16:29
Modified
2025-04-20 01:37
Severity ?
Summary
In Asterisk 11.x before 11.25.2, 13.x before 13.17.1, and 14.x before 14.6.1 and Certified Asterisk 11.x before 11.6-cert17 and 13.x before 13.13-cert5, unauthorized command execution is possible. The app_minivm module has an "externnotify" program configuration option that is executed by the MinivmNotify dialplan application. The application uses the caller-id name and number as part of a built string passed to the OS shell for interpretation and execution. Since the caller-id name and number can come from an untrusted source, a crafted caller-id name or number allows an arbitrary shell command injection.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:13.0.0:*:*:*:lts:*:*:*", "matchCriteriaId": "E7D1238A-A8D2-485E-81FD-46038A883EC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "E93A7967-9A04-424A-BDDB-A2B8289B9AC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "8F75C9FF-6F95-4F6A-B683-FE2BEDE3AD10", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "68226156-42ED-4F0E-93E1-02DD57E582B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FB2C4E1E-6B90-4DCC-BC09-7D19FBA65C3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A4EB385E-28B5-4259-9431-99E1F32D61B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "58C0FF1B-6188-4181-A139-1806328762BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "890EBB8C-989B-4344-AC03-62B399076008", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "BD4AAECB-A2BC-45BA-BC63-E51C1FE6C334", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "121EACD3-D5E3-4691-8024-95996865BB65", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "136D6508-660E-410D-829A-7DD452BF8819", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "AEC2B3AA-EB24-4259-BED1-5DBC102FE9C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "74B23D17-7356-4D37-8C73-E87896D1335B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CEA9DA4A-A3E6-4C46-9471-CCBFA71083AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "81A8A6CB-D236-4AB3-8476-C2D34DB7EF31", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "599833A2-CBE9-479B-8A6E-AF79C5EED1DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B55719B3-7325-47E1-8D16-3F34B1F44385", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B870B3B7-E8DC-45A2-8FA4-657D005D00E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "C91E9A3B-54EB-4819-94DD-30F7D0C90047", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "47189DF9-8E57-4BA6-9F52-B7A8229AE02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "84AAFA3C-3CCD-4615-9725-169C303CF18F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "C92E0801-9E8F-4CF2-A4A0-48BCF550F2D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "5C1C39FA-EF1A-4F2B-87A0-A00BAE73C6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "677D1211-0B07-47B9-AB7A-E820E2B29561", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "84202BAF-29E1-472B-B11F-B73F6A8891CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "FFC7120D-E6A0-4801-A1CC-3E143896EE72", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "BAF2A83D-D9AE-441D-8D4E-335BF9D28A63", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "7F5C1479-A540-4B7D-B00C-BD35EEC83BB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "AC12556C-5E82-47D7-87E5-FBDC01A920DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "461C1D2D-C4C1-4FF8-8231-38A2505F3523", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "66595711-8573-4A9B-A8FE-4943E3097AA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5D1FE3D4-A0B9-475A-9B89-B0222283A6A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "9670B5AC-CBD1-484C-90F8-69B1A60B6054", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "EE5794B6-246C-415E-8E20-56447F152488", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "E726CA39-A763-4422-B59E-E9E12518EA4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.12:*:*:*:*:*:*:*", "matchCriteriaId": "6A96EB57-835A-45B4-82F5-31F925A85629", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "206F1DC9-9E8F-4497-A354-4A14711993DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "8D428364-E2AD-4BC6-9329-71793BC0EB61", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "08963910-E0BD-4487-B669-60E0BFA79863", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.13:*:*:*:*:*:*:*", "matchCriteriaId": "86B16D04-3808-4380-8F64-0C36B185C1F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "F3BD16A9-24BC-4FC1-81BA-A6D1FEF38D35", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "68BAAD53-DE75-41CA-BF60-C0363029D3A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "CDC383B3-27EF-4C37-94BE-F0D41B34CAFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.14.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "A7824B34-06C3-403B-B6F3-C850D54438EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.14.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "17E86941-98F6-45A5-8646-6876F74D909F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "C6DB27C0-C74E-4E6A-AA63-09CFE73C2EF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "6C443A3B-DF96-4A68-B046-DE13689CA974", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.15.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5F3AC9AE-288C-4F0E-BF15-C3F4AF09D8E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.15.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "796A6021-9FCA-4354-A47C-7500C363C168", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.15.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "EBB9D073-195F-4C2A-932E-7F027710DB25", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "604E58C8-9B81-4992-8993-4A6CB876EE08", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "077C4CB8-1FDE-45D3-82E6-CE09A22809B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.16.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3CDB96CA-5AAE-4B39-8E01-2E72E3B476AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.16.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "8EB33EC3-CDE0-40BD-B269-512AE074D278", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "363FA95F-03EF-4D6A-A40D-76D285D16255", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.17.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "FA96DC31-4BAC-4C5A-923C-EBBFFC7ABB52", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:14.0:*:*:*:*:*:*:*", "matchCriteriaId": "C949D5F5-6C0B-4B17-85B6-3A77D08CF967", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D413741-BDB7-496D-A01B-75E2A98FDB5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "29130F7F-DE00-43E1-A4A6-8F1F95D5CB19", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "25E94EC0-F577-4B2B-8B11-DC76278CDD42", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "101AD474-9B89-483D-84E8-08012677C55C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D57E41F6-C2CF-4183-A78A-9531A88FB65D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FB1F9BB8-F951-427E-B770-69C2ACEBDB28", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C4CE405-E923-4C9C-849A-D1031C4DB493", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.1:*:*:*:*:*:*:*", "matchCriteriaId": "C039C0CE-9C9C-4D85-8D7C-574DCF9D920B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.01:*:*:*:*:*:*:*", "matchCriteriaId": "A1B2F2CC-18C3-46E7-8E7F-970622A710C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "04ECDFF1-9718-4FAE-B45B-4F8CCA82829E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D2C4DA60-5701-4BD0-B2F9-D93B9E64111F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "0B12834D-2AF1-4AD1-AB23-859CAA5D3210", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.02:*:*:*:*:*:*:*", "matchCriteriaId": "89036D04-EA04-4041-9694-6768478D35F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.2:*:*:*:*:*:*:*", "matchCriteriaId": "B19070D3-9F03-43C7-9F31-9A54BD5F2441", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E39BAA74-50A8-4087-8FF8-7C5922121319", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D29C253-B403-4B00-A626-3E3A920DC018", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E9D8FA2-21EA-4384-8001-118DA7C959F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3368DE88-7009-46A0-93F4-4D52BAD3D173", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "26586127-B68B-4476-8182-C49B1B1DCDC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D1EFDCC-983E-4227-9FD5-456C16610BC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "DFA7DBAD-BCA6-47D1-A92E-4EB7941F55F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "02C6C827-97A6-4287-8B3E-DE29054242B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.4.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "9BE4F7C1-BB82-44BA-BBFD-9F660330EC15", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.4.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "E4FCA146-5A72-4746-BE23-63271FBC4D47", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4A0C90BB-C3FE-4A75-B739-0236C4256F7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "46BD9466-0BC9-4B4D-928F-240CD46D306C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "06F456AD-19D3-49EF-82B1-07370F6499AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.5.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "24A9997E-D0DC-45B0-B4DB-308667FA820E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "26202E79-98E0-4533-B4AE-1ABB2477F5A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "C3D7384F-DF1B-4ED7-B1D5-885B95774DDB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F53B8453-F35A-49BE-8129-774BADF71BA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "CCB0C07E-DA2F-4169-848D-C3315CDC1CB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "410C43E6-5912-4C22-A592-7CF94402EEB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D50A355E-1B55-4DD2-8100-EB81AA6FC40E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "9ADF4230-EFEB-45EC-9C96-0262B4A3E459", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "5234531C-F69A-4B94-A480-147734206C5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "321C1066-6800-4488-A7C4-BE91FF738453", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9B51588-50A2-40B2-A007-06F57D38C7AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CDE2B00C-6AC0-4166-8A25-EFC42CE7F737", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "9FD404B4-2B0A-4D7A-8CF6-E2C6B4BACBB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "617FC4AF-D152-4EE1-828D-C2A6AD0DFD3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3A3FE6DC-17FD-4CEE-BDFB-9D4685640381", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8CEEB6C2-0A6D-4434-8446-CB8605CD3B14", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "1548C574-CD51-49F6-91B1-B06C504000E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "7BE4127D-8123-4408-86D3-08168A4501B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8836F348-66DF-43BC-9962-946018D13127", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "1453BB31-D674-4A05-AB2A-2502D127C3E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "868865A1-E074-4DB0-A119-D24C5C53FEF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "1794440C-7068-4673-9142-6221B8A39E5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "C5CF286B-3377-4AE9-A7B9-8535641D639A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "7B3D89C7-909F-419A-9EE8-A1F0D02934EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "50EC8D9D-3483-4080-8000-496343BC8BFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6695F632-6AC4-400F-B513-280304ABC1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "A3423C40-240A-4237-8B0F-A4B4ED421C3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:-:*:*:*:*:*:*", "matchCriteriaId": "03298D9F-CFB8-48F9-BD0C-8A0BEB0760C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "87FCBE6A-C1CD-48EF-A435-4CEADD46C917", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "42E0E639-70A2-41EE-9B34-A9223D1958AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "32E84D64-0CB8-46BF-BD3F-8CA2E0CE4C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A70420A8-8571-4528-98E1-72BE00270C6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "A276363F-F897-4E6D-9D55-5F5AA73DEE26", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "38230656-6242-4D24-AA67-F42A6FA2FC7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "20ED9FC3-5E56-4AE7-903F-267CAE7F2CA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "84F88075-9935-45BF-88B7-21ACE8AAB314", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "DB16D9D6-A2F6-4C4B-B364-1B63B1FFB5F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "283793E4-0AE8-48D9-ABCF-70E44FE55C4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "A0F79D5F-EB28-417A-86DF-053D6EDBA161", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.10.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "4A036F91-70E0-4E97-9896-EEE97BE3C20E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "C92ECBCD-1EE3-498A-B3A4-22BF8EFD2EE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "C4EABFC3-24FA-4441-9F2B-650D90AE5CC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.11.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3DA61A22-3DD0-46A3-8C13-F25F4F03FD35", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "2026FD07-103C-4691-AFA4-88C490382F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.12.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "791700CD-E007-489E-9BC6-37025CAA8144", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "65607103-4284-430A-8212-AC1DCFFFA778", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "4061B4C7-8315-450C-866A-C4F3A6BCB1A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.13.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "C6EA7154-7F08-4E43-9270-E617632230AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "00099DC9-D437-429B-9D08-F0DFA4942A6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.14.0:*:*:*:lts:*:*:*", "matchCriteriaId": "4149F36C-D455-415F-93D7-F92EEE41419D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.14.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "2DC51129-8F38-4505-90FB-4FFDED45BABF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.14.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "4CA571E0-B513-47AA-95BE-EB4DD2AA91E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "89504BDC-82F7-4813-9C1E-456C9ACC6FB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "118C550E-79A8-431E-BADB-710EEEEDC6C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.15.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "96C7950F-41D1-46B5-BA62-E8450CB81244", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.15.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "C9A32ECC-E208-4834-8EF7-FEF7A3495041", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "5DF6BC60-23F5-46A1-83F8-F4BCDEF196EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.16.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "AA3E0D41-2E6E-4294-8E56-1A738A7F9AA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.17.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D16109B8-4CDF-46FC-9AD9-A158E532791B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "9DCAA174-3CA3-49DB-BA19-D2BCF4F8953F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "FD4D1A5A-99A3-4D23-B40C-BBE11EA5B325", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.18.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0F5EE428-98FF-42BC-9F61-311327B8F610", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.19.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CBA2FD08-D761-410F-9804-A76F0DD77349", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.20.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "74B34C21-D90B-4E32-BBA6-7773DB663F18", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.21.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "90996D49-5731-4F7D-9DBE-D0599A5D85A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.21.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D3C91C8D-707D-443D-985F-FA3EDB181208", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "400EA2E1-B178-467F-BBC2-1B2ECEDE662A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E00A6C7-D3CF-40B5-A586-06E09C5AA1A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E25D043-EE0D-49A5-A468-03EDD9CFE0EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.22.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CA17630B-444D-4AE4-B582-F8106C4EEFDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "62A20D6B-62FE-440D-BC58-F764AAA5562B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.23.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "F2AE880B-2FA2-42BB-BEBF-771E18FDA141", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC982D1B-B018-474E-94BE-2157C21276C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "F26815C8-8E43-4C26-947B-986EFFF0ACE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "03E8213E-650F-4C95-B9E5-753E7784EF5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "00B8F794-A7F2-4B8F-B36C-55E61DC6939A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.25.1:*:*:*:*:*:*:*", "matchCriteriaId": "5B7FC3A1-AFB0-4280-BFC5-68F61CFD0AF2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:*:*:*:*", "matchCriteriaId": "322694EF-B086-4BE7-A9F0-41D3A9C245FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc1:*:*:*:*:*:*", "matchCriteriaId": "781AC882-80DD-4176-8E4F-220343B15F68", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc2:*:*:*:*:*:*", "matchCriteriaId": "770CCEEA-B121-454B-BD36-3FC1B262998A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert10:*:*:*:*:*:*", "matchCriteriaId": "5CEBE67E-A3E5-4BC9-8740-4F51123CC9F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert11:*:*:*:*:*:*", "matchCriteriaId": "CD094E25-5E10-4564-9A4D-BE5A14C2815F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert12:*:*:*:*:*:*", "matchCriteriaId": "B6873174-0109-402F-ADCA-B1635F441FD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert13:*:*:*:*:*:*", "matchCriteriaId": "B529CD2F-2958-44E6-839A-3E4FE392B1F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert14:*:*:*:*:*:*", "matchCriteriaId": "B961BF46-DEF7-4804-AF9A-D13F160FA213", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert14_rc1:*:*:*:*:*:*", "matchCriteriaId": "DDC801D4-7A69-4855-8757-24ACE70D784B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert14_rc2:*:*:*:*:*:*", "matchCriteriaId": "60C2B8F0-7722-48B5-89AA-435F52CBC0A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert15:*:*:*:*:*:*", "matchCriteriaId": "B9305CA8-835C-4DFF-9CD8-C1072BACED42", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert16:*:*:*:*:*:*", "matchCriteriaId": "B3729EA6-3949-4854-80D4-DC5587161FBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:*:*:*:*", "matchCriteriaId": "013B1940-C45D-4FE2-8B49-D92B8F1A9048", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:*:*:*:*", "matchCriteriaId": "A98B11B5-B8E2-4903-B4F7-3AC23751AE8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert4:*:*:*:*:*:*", "matchCriteriaId": "C7D60B24-C509-49C3-87A9-49D05CB44183", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert5:*:*:*:*:*:*", "matchCriteriaId": "3C1F9978-44E7-4D39-BEC6-5C6DB7F893E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert6:*:*:*:*:*:*", "matchCriteriaId": "69BA61A8-2A95-4800-BB4E-692BA4321A84", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert7:*:*:*:*:*:*", "matchCriteriaId": "C481D8B0-622D-491D-B292-717B0369B507", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert8:*:*:*:*:*:*", "matchCriteriaId": "BC8390D4-F339-43FF-9F2B-71331D4ECB81", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert9:*:*:*:*:*:*", "matchCriteriaId": "4490B76B-FA41-43DB-9A31-6B3F220F1907", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert1:*:*:*:*:*:*", "matchCriteriaId": "0449B393-FA4E-4664-8E16-BE6B94E4872F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc1:*:*:*:*:*:*", "matchCriteriaId": "2ED8E415-64FA-4E77-A423-3478E606E58E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc2:*:*:*:*:*:*", "matchCriteriaId": "E13CA1DD-B384-4408-B4EC-1AA829981016", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc3:*:*:*:*:*:*", "matchCriteriaId": "EE28BD0A-EA30-4265-A5D6-0390F3558D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc4:*:*:*:*:*:*", "matchCriteriaId": "0F82048D-C65F-4439-BBE4-2D4A9B07EB7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert2:*:*:*:*:*:*", "matchCriteriaId": "6447B77F-3770-4703-9188-B7344ED98E94", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert3:*:*:*:*:*:*", "matchCriteriaId": "5C103924-1D61-4090-8ED5-4731371B2B2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert4:*:*:*:*:*:*", "matchCriteriaId": "08F87B09-3867-4CAE-BAD7-2206CD6CAF97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Asterisk 11.x before 11.25.2, 13.x before 13.17.1, and 14.x before 14.6.1 and Certified Asterisk 11.x before 11.6-cert17 and 13.x before 13.13-cert5, unauthorized command execution is possible. The app_minivm module has an \"externnotify\" program configuration option that is executed by the MinivmNotify dialplan application. The application uses the caller-id name and number as part of a built string passed to the OS shell for interpretation and execution. Since the caller-id name and number can come from an untrusted source, a crafted caller-id name or number allows an arbitrary shell command injection." }, { "lang": "es", "value": "En Asterisk 11.x en versiones anteriores a la 11.25.2, 13.x en versiones anteriores a la 13.17.1, y 14.x en versiones anteriores a la 14.6.1 y Certified Asterisk 11.x en versiones anteriores a la 11.6-cert17 y 13.x en versiones anteriores a la 13.13-cert5, es ejecutar comandos sin autorizaci\u00f3n. El m\u00f3dulo app_minivm tiene una opci\u00f3n de configuraci\u00f3n de programa \"externnotify\" que es ejecutada por la aplicaci\u00f3n dialplan MinivmNotify. La aplicaci\u00f3n emplea el nombre y el n\u00famero caller-id como parte de una cadena integrada pasada al shell del sistema operativopara su interpretaci\u00f3n y ejecuci\u00f3n. Debido a que el nombre y el n\u00famero caller-id pueden proceder de una fuente no confiable, un nombre o n\u00famero caller-id permite una inyecci\u00f3n arbitraria de comandos shell." } ], "id": "CVE-2017-14100", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-09-02T16:29:00.333", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2017-006.html" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2017/dsa-3964" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039252" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.debian.org/873908" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27103" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/201710-29" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2017-006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2017/dsa-3964" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039252" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.debian.org/873908" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27103" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201710-29" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-04-18 22:14
Modified
2025-04-12 10:46
Severity ?
Summary
The PJSIP channel driver in Asterisk Open Source 12.x before 12.1.1, when qualify_frequency "is enabled on an AOR and the remote SIP server challenges for authentication of the resulting OPTIONS request," allows remote attackers to cause a denial of service (crash) via a PJSIP endpoint that does not have an associated outgoing request.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B446105E-6C8E-495A-BF83-A33CB33485A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:-:*:*:*:*:*:*", "matchCriteriaId": "F3DE062D-4E87-4691-A664-D9E7C02036EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3B4D6D24-A718-4962-AD4E-F19AFB03BFF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "BE2F0D0D-761C-4338-93F0-506E94E57000", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "3D38DFCA-E357-4A28-8F03-FDADF40A5185", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The PJSIP channel driver in Asterisk Open Source 12.x before 12.1.1, when qualify_frequency \"is enabled on an AOR and the remote SIP server challenges for authentication of the resulting OPTIONS request,\" allows remote attackers to cause a denial of service (crash) via a PJSIP endpoint that does not have an associated outgoing request." }, { "lang": "es", "value": "El controlador de canal PJSIP en Asterisk Open Source 12.x anterior a 12.1.1, cuando qualify_frequency \"est\u00e1 habilitado en un AOR y el servidor SIP remoto desaf\u00eda para autenticaci\u00f3n de la solicitud OPTIONS resultante,\" permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de un Endpoint de PJSIP que no tiene una solicitud saliente asociada." } ], "id": "CVE-2014-2288", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-04-18T22:14:38.087", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-003-12.diff" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-003.html" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130400.html" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130426.html" }, { "source": "cve@mitre.org", "url": "https://issues.asterisk.org/jira/browse/ASTERISK-23210" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-003-12.diff" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130400.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130426.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.asterisk.org/jira/browse/ASTERISK-23210" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-06-07 10:02
Modified
2025-04-03 01:03
Severity ?
Summary
The IAX2 channel driver (chan_iax2) for Asterisk 1.2.x before 1.2.9 and 1.0.x before 1.0.11 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via truncated IAX 2 (IAX2) video frames, which bypasses a length check and leads to a buffer overflow involving negative length check. NOTE: the vendor advisory claims that only a DoS is possible, but the original researcher is reliable.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "46C60C04-EF59-4F5C-96E5-A6E693EA9A06", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3636BB44-DF4D-40AB-8EBB-1EC5D911E4A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "B3B3C254-29D9-4911-89A9-AC0CD9EB13F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "4D8679FD-B2E5-46F6-B20C-F109B9706C63", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.0_beta1:*:*:*:*:*:*:*", "matchCriteriaId": "4042CC21-F3CB-4C77-9E60-AF8AA9A191C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.0_beta2:*:*:*:*:*:*:*", "matchCriteriaId": "C656168D-7D6A-4E84-9196-A8B170E1F7CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "C619138A-557F-419E-9832-D0FB0E9042C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "B6656EA0-4D4F-4251-A30F-48375C5CE3E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "4AAD9104-BA4A-478F-9B56-195E0F9A7DF5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The IAX2 channel driver (chan_iax2) for Asterisk 1.2.x before 1.2.9 and 1.0.x before 1.0.11 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via truncated IAX 2 (IAX2) video frames, which bypasses a length check and leads to a buffer overflow involving negative length check. NOTE: the vendor advisory claims that only a DoS is possible, but the original researcher is reliable." } ], "evaluatorSolution": "This vulnerability is addressed in the following product releases:\r\nAsterisk, Asterisk, 1.2.9 \r\nAsterisk, Asterisk, 1.0.11", "id": "CVE-2006-2898", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-06-07T10:02:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20497" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/20658" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/20899" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21222" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1016236" }, { "source": "cve@mitre.org", "url": "http://www.asterisk.org/node/95" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2006/dsa-1126" }, { "source": "cve@mitre.org", "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-15.xml" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/linux/security/advisories/2006_38_security.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/436127/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/436671/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/18295" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/2181" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27045" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20497" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/20658" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/20899" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1016236" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.asterisk.org/node/95" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2006/dsa-1126" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-15.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2006_38_security.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/436127/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/436671/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/18295" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/2181" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27045" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-11-24 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
The res_pjsip_acl module in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1 does not properly create and load ACLs defined in pjsip.conf at startup, which allows remote attackers to bypass intended PJSIP ACL rules.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "F21F0B73-A30F-4673-B3A8-D9F456FFCEF2", "versionEndExcluding": "12.7.1", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C83CD93-7CBA-4FF0-B29E-A509F4A3D5E2", "versionEndExcluding": "13.0.1", "versionStartIncluding": "13.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The res_pjsip_acl module in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1 does not properly create and load ACLs defined in pjsip.conf at startup, which allows remote attackers to bypass intended PJSIP ACL rules." }, { "lang": "es", "value": "El m\u00f3dulo res_pjsip_acl en Asterisk Open Source 12.x en versiones anteriores a 12.7.1 y 13.x en versiones anteriores a 13.0.1 no crea y carga adecuadamente ACLs definidos en pjsip.conf en el arranque, lo que permite a atacantes remotos eludir las reglas previstas para PJSIP ACL." } ], "id": "CVE-2014-8413", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-11-24T15:59:05.310", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-013.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-07-09 10:20
Modified
2025-04-11 00:51
Severity ?
Summary
channels/chan_sip.c in Asterisk Open Source 1.8.x before 1.8.13.1 and 10.x before 10.5.2, Asterisk Business Edition C.3.x before C.3.7.5, Certified Asterisk 1.8.11-certx before 1.8.11-cert4, and Asterisk Digiumphones 10.x.x-digiumphones before 10.5.2-digiumphones does not properly handle a provisional response to a SIP reINVITE request, which allows remote authenticated users to cause a denial of service (RTP port exhaustion) via sessions that lack final responses.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk_business_edition:c.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C7E50F92-00C1-4908-AA34-03F0C8B47DA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk_business_edition:c.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "49842130-C25E-43F6-9EC0-A7018AD915B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk_business_edition:c.3.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "1F830CEB-2B0B-4713-8C26-9FADE6C47673", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6344E43-E8AA-4340-B3A7-72F5D6A5D184", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "4C170C1C-909D-4439-91B5-DB1A9CD150C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EE821BE5-B1D3-4854-A700-3A83E5F15724", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "149C57CA-0B4B-4220-87FC-432418D1C393", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "035595D5-BBEC-4D85-AD7A-A2C932D2BA70", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "6DAF5655-F09F-47F8-AFA6-4B95F77A57F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F8E001D8-0A7B-4FDD-88E3-E124ED32B81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9D5CFFBD-785F-4417-A54A-F3565FD6E736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "D30EF999-92D1-4B19-8E32-1E4B35DE4EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "A67D156B-9C43-444F-ADEC-B21D99D1433C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "893EB152-6444-43DB-8714-9735354C873A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8447EE7-A834-41D7-9204-07BD3752870C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C04F2C9-5672-42F2-B664-A3EE4C954C29", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "33465668-4C91-4619-960A-D26D77853E53", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "CAD08674-0B44-44EA-940B-6812E2D5077D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "EEE87710-A129-43AA-BA08-8001848975FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F582C6E-5DA0-4D72-A40E-66BDBC5CF2B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CEBB8-01B3-4A05-AFE8-37A143C9833E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "522733A7-E89E-4BFD-AC93-D6882636E880", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "2FAC47DD-B613-43E4-B9BF-6120B81D9789", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "86D20CB5-60E8-405E-B387-CF80C7DA5E07", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "71AB5A01-5961-4053-9111-CF32C6473A00", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*", "matchCriteriaId": "77D8E1DC-041F-4B87-AF9A-E0EC4D6A4BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7CCCB892-30CE-4BEF-904E-5D957F94D0EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "F156798F-F2EF-4366-B17E-03165AB437D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "9EFBB9A6-DD1D-436E-919F-74A3E4F40396", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "054E34C8-B6A5-48C7-938E-D3C268E0E8BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*", "matchCriteriaId": "1DCECA72-533A-4A95-AB19-20C5F09A1B01", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*", "matchCriteriaId": "0E2309F8-AFEE-4150-99D1-BA606432ED73", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*", "matchCriteriaId": "7785F282-BFA0-400A-8398-872ACCA4BF37", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1278D3FB-78C6-4F7D-A845-0A93D4F6E2B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "C00A6EFB-A848-46D3-AAD7-FD8140007E42", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "CB6E3972-5C53-4B6D-BFE1-67E1122EA013", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "048617A0-A783-4519-A947-35220D4CD786", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "DD493A41-E686-444C-A34E-412804510F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "87D25FD6-CC3A-4AB0-B7B1-67D07386F99D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C402E9E-09CC-4EFA-AC27-156437B05B22", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C8A41F9C-D2F4-47A9-80CD-2B1BF6B0CB63", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "627FF5B9-E5A8-4DBC-A891-B175011E72A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6146EB2E-BA32-4408-B10B-A711EC39C580", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "1C863324-05AE-4FCA-BD2E-39040A468DCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A85F51E7-0AAE-4F3B-9F90-BD2E31255822", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "315FB0D4-D4A4-4369-BFB8-F2CAEB429015", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "DC74D6C5-F410-4B68-AF92-056B727193A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "B70911F8-A526-4600-8198-03FF4CCB28DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA60A9C9-C2EF-4971-BEFB-FF687DAEF2F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "BAFB22FA-CC24-4AFE-AC83-2D044563F7CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "00F3EB0D-7C63-46B5-BA95-8486B9716C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "00C1BF3B-7593-478D-9AAA-153901C70286", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "5F86406A-0936-4A06-88FB-4137A64498EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "672CE4C0-EBD6-470B-937E-810FF1C4CDBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "88DB1105-74D8-4312-9D02-D1E21F2E785C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "404C0557-6229-4D90-BFDD-54AFFCCE6A19", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6D1D26CC-891F-4396-B7D7-30D712829E71", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F25B61EA-F4D1-452A-9D96-B8DFDD719B0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9324AB96-EC99-4F04-A0A9-00F936C86EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "BDB6BBCA-47CE-49B8-9706-AFDE4BE46550", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "8BFF65E2-692B-4C39-88FC-6DED8D9A7258", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E8AE686-B618-4B0D-BD27-1F96295E964D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E9751C0A-84F5-4A43-8282-12A9DE559569", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F67E2694-F6F1-482C-91F2-D9FD856EA31B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "5E2D53AA-8D50-445F-9500-2F580F260DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "8880AE7C-3E44-4B76-B500-E93868D4CF5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7C94269D-A271-42AC-A44C-102C814E564B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E7E5B826-D3D5-4D2D-BB4D-2C1BEDE92456", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asteriske:1.8.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "5B9023E8-DB6F-4DE2-BB1E-D941BE279477", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asteriske:1.8.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "DF6135C4-7930-4DD5-80CD-4DC7F53956D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert:*:*:*:*:*:*", "matchCriteriaId": "C63C46CC-02E2-40AF-8281-F2FB5D89823A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert1:*:*:*:*:*:*", "matchCriteriaId": "71BAF2A7-024D-475A-88C0-0F5ADE3CA286", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "6372EEEA-2759-4B6A-BD03-D84DC956E80E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta1:digiumphones:*:*:*:*:*", "matchCriteriaId": "26DF0C53-9F6A-4233-B163-AEC1F9886387", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta2:digiumphones:*:*:*:*:*", "matchCriteriaId": "79A063D7-553F-486F-9079-D95C8047B05E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc1:digiumphones:*:*:*:*:*", "matchCriteriaId": "B606D854-FC06-4314-AD24-FEEA3796A0AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc2:digiumphones:*:*:*:*:*", "matchCriteriaId": "DEBB0786-D912-48D1-BC63-E0F87E078154", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc3:digiumphones:*:*:*:*:*", "matchCriteriaId": "1C39DD70-1220-4CC6-95B4-CE18CA5787CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "B0005F0B-9C87-4160-9416-A7C136FCD5AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc1:digiumphones:*:*:*:*:*", "matchCriteriaId": "12073B6A-14B1-490B-B267-A68194C68BDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc2:digiumphones:*:*:*:*:*", "matchCriteriaId": "198C92F2-8268-4045-B297-17E0D1F9726E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "5D3A3C00-EA83-4EF4-8681-DB5616132607", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc1:digiumphones:*:*:*:*:*", "matchCriteriaId": "5FE59F0F-44B0-4940-8368-F360EE610114", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc2:digiumphones:*:*:*:*:*", "matchCriteriaId": "3647F0E3-196F-486B-9BAB-75ED24A055ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc3:digiumphones:*:*:*:*:*", "matchCriteriaId": "1FBC4A5F-FB16-42B2-9689-25F8B3D0F521", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc4:digiumphones:*:*:*:*:*", "matchCriteriaId": "B788D6E2-78E8-4DE1-81F5-40D52263E7F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "51358F60-4D6C-4DBA-86B0-E12C48A67456", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc2:digiumphones:*:*:*:*:*", "matchCriteriaId": "D51C9952-97F4-4326-8F7D-34579D3686AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc3:digiumphones:*:*:*:*:*", "matchCriteriaId": "3711A75C-AF87-4A5C-8B35-1CF834C12D2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "E7FFD09D-21A3-4E98-B1FA-C7A16C243D91", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc1:digiumphones:*:*:*:*:*", "matchCriteriaId": "FAC6591A-BC5A-4CA9-90BC-0B686F74127B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc2:digiumphones:*:*:*:*:*", "matchCriteriaId": "01BAF29D-8679-40F3-AB6C-DA5C3787271C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "B42229C3-B18E-4D50-9B98-202CB1805CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc1:digiumphones:*:*:*:*:*", "matchCriteriaId": "15DF192B-A8D5-4FCC-B469-505A8FA11D00", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc2:digiumphones:*:*:*:*:*", "matchCriteriaId": "D24E01F7-604D-4D05-B698-3BDEF7B69EF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.1:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "A54A74F4-8A6C-4090-88C2-8AB5A606C59B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "687ED3CE-67C4-410D-8AF4-C769015598F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "30E918CD-89C4-42DA-9709-E50E0A3FA736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "DA57FA15-D0D7-4A97-9C25-6F6566940098", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "A1C45300-A2CF-40E7-AB67-23DC24C31A1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "958081DC-1D77-45CD-A940-C7A1AB42C7BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "298A879D-4F65-4523-A752-D17C4F81B822", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "37AB07BE-54C4-4972-A05F-D1E2CF4363CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBC63564-A84E-463D-8312-DDF1C6B7796F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "62A0906E-B631-4F3A-9ABC-9A43A43220BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "C6314ADA-2849-416D-966E-C01C322EF904", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "8B6CB1DD-614A-4B3D-99AE-9B1341427024", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "CC95B04F-3746-4F1C-8428-A1FA10253E14", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "20819080-E0AB-4879-B4CF-A154D6F7EF6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C6C45753-E2CC-4F7C-B8DA-3D8CF255EA22", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5A080197-D6AA-4FDC-888E-51D1C8251E34", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "1F08D930-D4C1-4C63-875C-171C46AE97C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "1AA43D7D-AEAD-47CB-BFA5-B73004A1A7A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "B5ED5F6F-166D-4610-8939-A33AD45F1ADE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D40002A-564E-425C-BA2A-7C4A8F8DAFD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "521C4DB2-7127-4BA9-94FC-AB0E9E06FE2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "8C905DC1-8AB8-4D83-BB5B-FA4DABC58229", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "ECC74B5D-97A1-46FF-AFA3-5D5E4A0BF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "F2D98C7C-94A8-4348-AF22-04A41FB6F8EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "85D39A99-E9A6-4860-BC61-56CA2FC3238B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "845DA0A4-1983-4E82-99C8-B7FBF47C632E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "5A63FBB7-F1CF-4603-848F-980742D2ED36", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "10B2084F-3AF4-4008-899C-6C1E43715201", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "217C13A5-9F8A-4392-858F-2FC88B03EB0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "6B282462-900C-492E-98DE-65364E62F5E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "687784F0-9ACC-435D-81F9-1E1B0F61010C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "9D7D020C-FE32-408B-BE37-58835FD3D95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "39B7938F-7370-4F67-B0CD-1C14DE2E4E7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC587195-5973-423B-8BF9-3E0B27363B76", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert:*:*:*:*:*:*", "matchCriteriaId": "C63C46CC-02E2-40AF-8281-F2FB5D89823A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert1:*:*:*:*:*:*", "matchCriteriaId": "71BAF2A7-024D-475A-88C0-0F5ADE3CA286", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert2:*:*:*:*:*:*", "matchCriteriaId": "82F91FE8-C320-466B-AF08-67319A00A2BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert3:*:*:*:*:*:*", "matchCriteriaId": "DCFF0E1C-B455-4C18-8AA1-10408234327B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "channels/chan_sip.c in Asterisk Open Source 1.8.x before 1.8.13.1 and 10.x before 10.5.2, Asterisk Business Edition C.3.x before C.3.7.5, Certified Asterisk 1.8.11-certx before 1.8.11-cert4, and Asterisk Digiumphones 10.x.x-digiumphones before 10.5.2-digiumphones does not properly handle a provisional response to a SIP reINVITE request, which allows remote authenticated users to cause a denial of service (RTP port exhaustion) via sessions that lack final responses." }, { "lang": "es", "value": "Asterisk Open Source v1.8.x anterior a v1.8.13.1 y v10.x anterior a v10.5.2, Asterisk Business Edition vC.3.x anterior a vC.3.7.5, Certified Asterisk v1.8.11-certx anterior a v1.8.11-cert4, y Asterisk Digiumphones v10.x.x-digiumphones anterior a v10.5.2-digiumphones no maneja una respuesta provisional a una petici\u00f3n SIP reINVITE de forma adecuada, lo que permite a atacantes remotos autenticados provocar una denegaci\u00f3n de servicio (agotamiento de puerto RTP) a trav\u00e9s de sesiones que carecen de repuestas finales." } ], "id": "CVE-2012-3863", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-07-09T10:20:44.823", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2012-010.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/50687" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/50756" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2012/dsa-2550" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/54327" }, { "source": "cve@mitre.org", "url": "https://issues.asterisk.org/jira/browse/ASTERISK-19992" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2012-010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/50687" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/50756" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2550" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/54327" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.asterisk.org/jira/browse/ASTERISK-19992" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-07-12 20:15
Modified
2024-11-21 04:24
Severity ?
Summary
An issue was discovered in Asterisk Open Source through 13.27.0, 14.x and 15.x through 15.7.2, and 16.x through 16.4.0, and Certified Asterisk through 13.21-cert3. A pointer dereference in chan_sip while handling SDP negotiation allows an attacker to crash Asterisk when handling an SDP answer to an outgoing T.38 re-invite. To exploit this vulnerability an attacker must cause the chan_sip module to send a T.38 re-invite request to them. Upon receipt, the attacker must send an SDP answer containing both a T.38 UDPTL stream and another media stream containing only a codec (which is not permitted according to the chan_sip configuration).
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://downloads.digium.com/pub/security/AST-2019-003.html | Vendor Advisory | |
cve@mitre.org | https://issues.asterisk.org/jira/browse/ASTERISK-28465 | Issue Tracking, Vendor Advisory | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2019/11/msg00038.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2022/04/msg00001.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://downloads.digium.com/pub/security/AST-2019-003.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://issues.asterisk.org/jira/browse/ASTERISK-28465 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2019/11/msg00038.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2022/04/msg00001.html | Mailing List, Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "93F2B062-09B4-44F1-87E4-6104B757B557", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "F2877B09-B0B9-4AD4-906A-D40E25DDC4BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "11AAE0EA-D7EB-4341-A412-FBCDC99565A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "37F93124-25D9-44ED-B4AB-1B3552FCAB09", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "E4CB22F6-9F63-427C-B2D2-7ABB9B4F7694", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "758AB27B-7C40-41ED-9FC3-BE3D682EE48A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "07D3186A-CD6F-432A-8653-4CFBA37B9864", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "746FB2E6-EF66-4EF3-946C-111FB7728EBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "91D933DB-06F7-45A4-A517-BFAEC82DDB7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "3AAB500F-8F0D-4534-B659-C495D1799913", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "5F5C5156-CC72-4AB5-A927-E874199EBD8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.1.0:-:*:*:*:*:*:*", "matchCriteriaId": "AB912D4D-6BA4-4AEF-BBFD-EABFED240015", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "68C78C16-3807-4272-9B46-9D9AF5150879", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.2.0:-:*:*:*:*:*:*", "matchCriteriaId": "02E13D3A-B37B-4215-82E0-3FCE5E35B00A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "BE0F93D1-7602-47AC-9ACE-AA850D7DFD23", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.3.0:-:*:*:*:*:*:*", "matchCriteriaId": "956BCED3-1818-4673-A0F4-E7F03F366D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0B58ACCC-0255-46B1-8517-EDCD85AA0F35", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "A921B590-57C2-4E0A-B28B-D0E48F5E1B58", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.3.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "70F0AE7B-9E53-4E3B-AA9E-EAF7C4C31E1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.4.0:-:*:*:*:*:*:*", "matchCriteriaId": "5DE6F187-7236-4622-BD62-1E5F0742B41B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "F70DDB6D-BE16-4375-87AE-E5E2B5862D17", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.4.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6910E07C-3ACA-414F-B468-13E4BF9BE938", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.4.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "837A07D7-C2FD-4077-A0AD-AF2147E04B84", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.5.0:-:*:*:*:*:*:*", "matchCriteriaId": "B2A99209-E8C5-44E6-A8DA-7FC07FBA6D87", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "18985B4A-4C54-4EC6-9274-15E7DCFEC94D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.6.0:-:*:*:*:*:*:*", "matchCriteriaId": "48AE70AD-85BE-44DE-BC75-1690C27821B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "804F861A-81E1-45C5-A7D3-0E73770AC155", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "0AE503BD-F9BD-4396-B27D-184AE06F594D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9CD9A213-27F7-410E-97B1-E7405B4FCECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.7.0:-:*:*:*:*:*:*", "matchCriteriaId": "10FFDE4F-0B30-43C3-9475-80259D5E9055", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5F30E2AB-B354-4583-9D76-9DF1727407A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "DBDFE57E-EEBF-4722-B6D0-147F72018DE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.8.0:-:*:*:*:*:*:*", "matchCriteriaId": "902A2600-49A7-4013-A621-9EE94F1E8435", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7021D54A-D443-492A-AE8C-62F2B85A1F37", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "B003CB5A-A95A-481F-B762-79C476829D81", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "84C8BB88-FBE3-4C82-9D53-E34AA7B6A73E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "F8037EB0-42FA-45BA-9E8E-D279432EC4CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "E374559C-E550-4BB9-9682-9C4535EAE9A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.9.0:-:*:*:*:*:*:*", "matchCriteriaId": "FFFB7E8B-C963-4ACB-AE37-9E4938A5462E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "DF83EAD3-3CC1-4C1B-AAB8-0FE03BB67EC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.9.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E3F75AF0-A4E0-425E-B707-ED1F58C9CC83", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.9.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "745EC4D8-5E19-48C8-8609-11A74DC18266", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.10.0:-:*:*:*:*:*:*", "matchCriteriaId": "F1871DC4-AA58-4C04-9D6A-4FF383C56405", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8560DBD-A70E-4033-AE2E-96DA373AB425", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.10.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E08ECE50-3A53-45C1-8BEA-8B9E024E22F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.10.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "59C2E58B-EEB3-4E8D-940C-2DF846923B19", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.10.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "D40F2ADC-6F79-410F-9063-1354C15F0D8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert:*:*:*:*:*:*", "matchCriteriaId": "C63C46CC-02E2-40AF-8281-F2FB5D89823A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert1:*:*:*:*:*:*", "matchCriteriaId": "71BAF2A7-024D-475A-88C0-0F5ADE3CA286", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert10:*:*:*:*:*:*", "matchCriteriaId": "27E0B1E7-1DA3-47C4-AA2A-54D4C2C48A8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert2:*:*:*:*:*:*", "matchCriteriaId": "82F91FE8-C320-466B-AF08-67319A00A2BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert3:*:*:*:*:*:*", "matchCriteriaId": "DCFF0E1C-B455-4C18-8AA1-10408234327B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert3-rc1:*:*:*:*:*:*", "matchCriteriaId": "05D19102-FF8D-439F-87E7-B1FE97C55F8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert3-rc2:*:*:*:*:*:*", "matchCriteriaId": "8EC4CE45-1378-402C-8552-745B6414B9E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert4:*:*:*:*:*:*", "matchCriteriaId": "738F68B3-2C5E-4A09-8FF4-2D034ED0C54D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert5:*:*:*:*:*:*", "matchCriteriaId": "6A60C223-AD68-4BFF-91C1-2C7E9F727AA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert5-rc1:*:*:*:*:*:*", "matchCriteriaId": "0F97E946-8876-417D-9C49-D990A14CFBB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert5-rc2:*:*:*:*:*:*", "matchCriteriaId": "887F4341-84C2-40F6-BB7C-68DAFC3D188E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert6:*:*:*:*:*:*", "matchCriteriaId": "4C313F81-8B38-4845-B1C7-CBB23D7C99B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert7:*:*:*:*:*:*", "matchCriteriaId": "A08731AB-1E43-48B9-AB4C-0B06A34D0807", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert8:*:*:*:*:*:*", "matchCriteriaId": "5A4FBB03-4A60-4A34-855B-74C5079F7769", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert9:*:*:*:*:*:*", "matchCriteriaId": "66E97D3F-3AEB-40EB-87E7-18EC7A84F0CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert9-rc1:*:*:*:*:*:*", "matchCriteriaId": "C5CBAA8C-29D9-468C-9FA3-CBC005793955", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11.0:-:*:*:*:*:*:*", "matchCriteriaId": "69E55195-84CC-46DB-9E49-DEB864DF0659", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7F58B52D-9510-465F-8BFB-6896B4D36F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "59E72AD4-90BE-4C3B-B457-31FF193712FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "81EB266E-40BC-45EA-8EDB-4766011C460B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.12.0:-:*:*:*:*:*:*", "matchCriteriaId": "E23FCBC3-30EF-47BC-AEFE-073E84B6DBA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.12.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5AB33EDF-29D7-4092-91FE-505B39D3E57B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.12.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "4F698874-028E-410B-90FE-FDD441F55C32", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.12.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "081DA344-7266-4D67-8B92-830F43B42CC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.13.0:-:*:*:*:*:*:*", "matchCriteriaId": "01851B4A-F7CB-4263-B06C-92D39A693530", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.13.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6BB95638-D09F-4F02-9076-49BE93F2A407", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.13.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6E2DD3AF-EF01-4A1A-AF9A-98575E36D088", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.14.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "163E8F93-432A-4F68-B309-7A38AE1A30FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.14.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F53C384F-75DD-4A29-8907-BA95F08B1465", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:-:*:*:*:*:*:*", "matchCriteriaId": "6BB940E4-E612-4B27-9188-E794665191B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1:*:*:*:*:*:*", "matchCriteriaId": "2365F1EE-16A4-4293-B80E-A51CD6A2F112", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1-rc1:*:*:*:*:*:*", "matchCriteriaId": "6B7AE7FB-8170-41AD-9597-07335D36AE48", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1-rc2:*:*:*:*:*:*", "matchCriteriaId": "9131FB32-E3F0-476C-A0D1-36E2101631D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1-rc3:*:*:*:*:*:*", "matchCriteriaId": "5209356B-4A86-4C93-9D04-C66969F23BC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1_rc1:*:*:*:*:*:*", "matchCriteriaId": "6952FFDE-92D0-4A75-AABB-113E6FAF5A31", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1_rc2:*:*:*:*:*:*", "matchCriteriaId": "5735354A-CF57-4A9A-9607-169CE50E0655", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1_rc3:*:*:*:*:*:*", "matchCriteriaId": "38E0B2C4-55EA-4712-8E75-24A5718F9FD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert2:*:*:*:*:*:*", "matchCriteriaId": "F087C546-FBCA-4D0D-A023-8F9384CD160C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert3:*:*:*:*:*:*", "matchCriteriaId": "832F5503-6354-4E39-B927-3BA9606A372D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert4:*:*:*:*:*:*", "matchCriteriaId": "9E23AF8A-63B2-4597-8E78-A4672B0C44B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert5:*:*:*:*:*:*", "matchCriteriaId": "F76EA1D5-F5F3-49CE-9A73-20FA03C31F88", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert6:*:*:*:*:*:*", "matchCriteriaId": "593ED9E3-D56C-4336-976B-27D30EED658A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert7:*:*:*:*:*:*", "matchCriteriaId": "9FBB5951-3D34-4808-BBC3-5402147FE6A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.28:*:*:*:*:*:*:*", "matchCriteriaId": "9365B811-5620-42F0-9400-5EA49361D2B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.28:cert1:*:*:lts:*:*:*", "matchCriteriaId": "E63726F0-3BC6-49E7-BDE9-71196B480149", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.28:cert1-rc1:*:*:*:*:*:*", "matchCriteriaId": "536ECC06-D2DC-474F-AB44-7A8B16ADFC9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.28:cert2:*:*:*:*:*:*", "matchCriteriaId": "6001EFB8-A539-4F3C-B9F3-7A513FA458BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.28:cert2:*:*:lts:*:*:*", "matchCriteriaId": "677AB746-AE4F-46B0-BEE3-82A1FE77271F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.28:cert3:*:*:*:*:*:*", "matchCriteriaId": "1035C6D2-E8FD-4FFA-9AC7-17534609D68C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.28:cert4:*:*:*:*:*:*", "matchCriteriaId": "DBD12EE0-78F6-450F-9AD9-D64A55377D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.28:cert5:*:*:*:*:*:*", "matchCriteriaId": "BFA21D5A-0BC6-45E0-AD84-F91F185275B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.28.0:*:*:*:lts:*:*:*", "matchCriteriaId": "C675C7BA-65E9-4A0A-9A6D-1EBCBEA1D718", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F596E34-529A-41AD-AD51-C1D7EEE0FFF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "EC1BE0BB-A469-4DB6-88CF-80A065329C65", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "4EA68726-87EF-490F-BBB8-A321E6C7A16D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C8B3572-D6F6-45BD-9BE4-D532F9BF134E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7738E036-DACC-42EE-B417-CB083319B0A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "A6847720-D556-49D7-BD7F-E0559C6F5780", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "BA81D724-584B-4863-B270-869C415DB5BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.2:cert1:*:*:*:*:*:*", "matchCriteriaId": "02317CB5-C06E-414B-96A3-255607A5DF93", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.2:cert1-rc2:*:*:*:*:*:*", "matchCriteriaId": "9F2FC5E1-6E2E-4C7A-A888-60FCA303CCC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.2:cert2:*:*:*:*:*:*", "matchCriteriaId": "08DEE3EC-63F3-45EB-947E-E8503DBD3669", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.2:cert3:*:*:*:*:*:*", "matchCriteriaId": "D68D79BE-8302-42D1-87C2-0F2CFF8B1796", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF76131B-DF2C-4C6A-8E6B-1319D231402D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "9AB8C209-694F-41BF-9CF2-D68D4E58A43C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6438A881-C806-4CC1-9828-C34BBB0FF332", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "2704EED6-C72D-427D-AD37-EBC4042CDD76", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "AF835684-26C6-4734-B586-D5DB4DF33072", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.4.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "4EB76BC0-2B72-495E-80FC-C6B194648A91", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.4.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9F1BC546-92E0-4285-8C18-37705F44B94E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D50F0DF-54D3-4883-ADA2-DDB79F786182", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0838BEC6-680A-4695-BD1B-309290F16A3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.5.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "82F78D49-ED8C-43FF-AE6D-713E90F1A1BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:*:*:*:*", "matchCriteriaId": "322694EF-B086-4BE7-A9F0-41D3A9C245FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:lts:*:*:*", "matchCriteriaId": "6AD7C9B3-D029-4E05-8E80-3ADA904FAC1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1-rc1:*:*:*:*:*:*", "matchCriteriaId": "B178B8F1-4AF8-478A-B842-DD5047D65C9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1-rc2:*:*:*:*:*:*", "matchCriteriaId": "E9D5545B-44D5-4872-8702-8D49579DE531", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc1:*:*:*:*:*:*", "matchCriteriaId": "781AC882-80DD-4176-8E4F-220343B15F68", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc2:*:*:*:*:*:*", "matchCriteriaId": "770CCEEA-B121-454B-BD36-3FC1B262998A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert10:*:*:*:*:*:*", "matchCriteriaId": "5CEBE67E-A3E5-4BC9-8740-4F51123CC9F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert11:*:*:*:*:*:*", "matchCriteriaId": "CD094E25-5E10-4564-9A4D-BE5A14C2815F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert12:*:*:*:*:*:*", "matchCriteriaId": "B6873174-0109-402F-ADCA-B1635F441FD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert12:*:*:lts:*:*:*", "matchCriteriaId": "BFFD88AD-C82E-4C5C-9C4F-8A49176E3E52", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert13:*:*:*:*:*:*", "matchCriteriaId": "B529CD2F-2958-44E6-839A-3E4FE392B1F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert13:*:*:lts:*:*:*", "matchCriteriaId": "6797C78B-BB9A-46B4-8F0B-492FB1988BB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert14:*:*:*:*:*:*", "matchCriteriaId": "B961BF46-DEF7-4804-AF9A-D13F160FA213", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert14:*:*:lts:*:*:*", "matchCriteriaId": "10A38D53-6C8E-493E-8207-F4CF7D754A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert14-rc1:*:*:*:*:*:*", "matchCriteriaId": "5EE8689E-AF57-400D-B321-D3F66D1169FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert14-rc2:*:*:*:*:*:*", "matchCriteriaId": "5C55AA35-5E1C-4411-BC01-0FF9D1928EC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert15:*:*:*:*:*:*", "matchCriteriaId": "B9305CA8-835C-4DFF-9CD8-C1072BACED42", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert15:*:*:lts:*:*:*", "matchCriteriaId": "4CC0C753-9179-4C71-AFD8-C4601D8C865A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert16:*:*:*:*:*:*", "matchCriteriaId": "B3729EA6-3949-4854-80D4-DC5587161FBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert17:*:*:*:*:*:*", "matchCriteriaId": "9A416C55-D670-4CCC-BEFE-12CB3438C81B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert18:*:*:*:*:*:*", "matchCriteriaId": "A79C0247-82DD-4EE7-80F6-9D3DCBB30FC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:*:*:*:*", "matchCriteriaId": "013B1940-C45D-4FE2-8B49-D92B8F1A9048", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:lts:*:*:*", "matchCriteriaId": "CE71221B-4D55-4643-B6D1-307B2CF41F98", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:*:*:*:*", "matchCriteriaId": "A98B11B5-B8E2-4903-B4F7-3AC23751AE8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:lts:*:*:*", "matchCriteriaId": "88124275-9BEB-4D53-9E4D-1AC8C52F2D0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert4:*:*:*:*:*:*", "matchCriteriaId": "C7D60B24-C509-49C3-87A9-49D05CB44183", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert4:*:*:lts:*:*:*", "matchCriteriaId": "4F3CEFEF-72B6-4B58-81FE-01BCEEFB3013", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert5:*:*:*:*:*:*", "matchCriteriaId": "3C1F9978-44E7-4D39-BEC6-5C6DB7F893E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert5:*:*:lts:*:*:*", "matchCriteriaId": "AA637187-0EAE-4756-AD72-A0B2FABCA070", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert6:*:*:*:*:*:*", "matchCriteriaId": "69BA61A8-2A95-4800-BB4E-692BA4321A84", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert6:*:*:lts:*:*:*", "matchCriteriaId": "6DAF6784-0B31-4104-9D85-473D5AFAB785", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert7:*:*:*:*:*:*", "matchCriteriaId": "C481D8B0-622D-491D-B292-717B0369B507", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert7:*:*:lts:*:*:*", "matchCriteriaId": "77B06B83-D62C-4A0E-BE94-83C9A02CE55A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert8:*:*:*:*:*:*", "matchCriteriaId": "BC8390D4-F339-43FF-9F2B-71331D4ECB81", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert8:*:*:lts:*:*:*", "matchCriteriaId": "CAD17809-CBB1-4E41-99C9-20FE56853563", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert9:*:*:*:*:*:*", "matchCriteriaId": "4490B76B-FA41-43DB-9A31-6B3F220F1907", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6.0:*:*:*:lts:*:*:*", "matchCriteriaId": "D6EE9895-FB94-451D-8701-8C0DD8F5BED0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6.0:-:*:*:*:*:*:*", "matchCriteriaId": "CCDDF5C2-9B45-4811-90F6-984EF4B220CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "56849E34-B192-46A8-A517-C7C184A901B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "4610D544-156F-4E9A-BC46-9E0FF8D5D641", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1:cert1:*:*:*:*:*:*", "matchCriteriaId": "0C6CF412-290C-4524-9AFE-D58A85183864", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1:cert1-rc1:*:*:*:*:*:*", "matchCriteriaId": "8A9D3C5C-627E-43A3-89C2-95F7B8803361", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1:cert1-rc3:*:*:*:*:*:*", "matchCriteriaId": "5060CAED-EEAB-4AD1-B964-F6538499BF73", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1:cert2:*:*:*:*:*:*", "matchCriteriaId": "BA3211EE-E305-4247-AA2E-910E48CBCDF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1:cert3:*:*:*:*:*:*", "matchCriteriaId": "61816D1A-D952-4E4F-B5DD-3B7A94BD8596", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1:cert3-rc1:*:*:*:*:*:*", "matchCriteriaId": "6B4693A3-86BC-4368-AFDA-B0E323776957", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1:cert4:*:*:*:*:*:*", "matchCriteriaId": "4D1D0689-E276-47DD-B51A-C221F12C60A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1:cert5:*:*:*:*:*:*", "matchCriteriaId": "8433CB3B-56BA-4674-AC2B-813A7F3EDEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1:cert6:*:*:*:*:*:*", "matchCriteriaId": "9E1066C8-8A7E-487B-8D9B-DD4A55A5C5EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1:cert7:*:*:*:*:*:*", "matchCriteriaId": "3C1A0AE4-EA01-445E-89AE-1A9734478994", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1:cert8:*:*:*:*:*:*", "matchCriteriaId": "4497BD45-DFC5-4729-98CD-20C94BC20C70", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9F68ED1E-8D2B-4AEE-B5DE-FD50338BA82D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "EA9F296A-4932-4EA4-8B38-80856A9D6374", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "B40673A6-2980-440A-B78E-D5C7095E3FA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.8:cert1:*:*:*:*:*:*", "matchCriteriaId": "38E19C8E-9FD6-4A44-81C6-EEC91BC2CB58", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.8:cert1-rc2:*:*:*:*:*:*", "matchCriteriaId": "3C7605A6-380F-44E8-81A1-5BDAEBFFB0A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.8:cert1-rc3:*:*:*:*:*:*", "matchCriteriaId": "43DB632E-C528-40E3-8EB0-AA6A7476657C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.8:cert1_rc1:*:*:*:*:*:*", "matchCriteriaId": "2016E8F9-542D-46CE-905D-3CBAF97A24A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.8:cert1_rc2:*:*:*:*:*:*", "matchCriteriaId": "CC283754-B316-4BCE-8EEB-63CAFE68D601", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.8:cert1_rc3:*:*:*:*:*:*", "matchCriteriaId": "9D111448-7C39-4A6D-B492-B3D3DCEA8424", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.8:cert2:*:*:*:*:*:*", "matchCriteriaId": "6267CC33-3961-4D9A-899B-4F34BAD64067", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.8:cert2-rc1:*:*:*:*:*:*", "matchCriteriaId": "0CCF7282-A16F-499E-B607-929F346A85A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.8:cert2_rc1:*:*:*:*:*:*", "matchCriteriaId": "A52E12AB-99CA-4A34-A0CA-E8B511636A5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.8:cert3:*:*:*:*:*:*", "matchCriteriaId": "ACFD2F39-957E-42CE-8016-21314F432335", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.8:cert4:*:*:*:*:*:*", "matchCriteriaId": "22E13F7F-1D64-4248-84F2-C6E89A2FC977", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "BDB08CB2-8FB4-4738-9B67-C27273A78025", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "1E36EFEF-670E-4659-A887-D497D4AA8223", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert1-rc1:*:*:*:*:*:*", "matchCriteriaId": "BED18370-B09E-44D8-8E84-1B0DCDF81864", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert1-rc2:*:*:*:*:*:*", "matchCriteriaId": "2F2F88BE-10E5-4C21-B67B-1AC264921663", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert1-rc3:*:*:*:*:*:*", "matchCriteriaId": "0742A842-254A-4008-9D77-D0A810110841", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert1-rc4:*:*:*:*:*:*", "matchCriteriaId": "06396597-A5D1-4C30-B07F-E989E322733E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert2:*:*:*:*:*:*", "matchCriteriaId": "6447B77F-3770-4703-9188-B7344ED98E94", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert3:*:*:*:*:*:*", "matchCriteriaId": "5C103924-1D61-4090-8ED5-4731371B2B2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert4:*:*:*:*:*:*", "matchCriteriaId": "08F87B09-3867-4CAE-BAD7-2206CD6CAF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert5:*:*:*:*:*:*", "matchCriteriaId": "0D12B31E-C30C-442A-9BD8-504CF7EB1321", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert6:*:*:*:*:*:*", "matchCriteriaId": "B43DA484-83DC-4489-9037-B85B845078E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert7:*:*:*:*:*:*", "matchCriteriaId": "D8740005-0BCF-4B76-A600-25A9BF0F3C42", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert8:*:*:*:*:*:*", "matchCriteriaId": "4298EEE5-3F0E-4227-ACF8-CEE18868055F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert9:*:*:*:*:*:*", "matchCriteriaId": "AC42C2B5-4F5F-4D5E-9240-9F104BBB5D55", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13-cert2:*:*:*:*:*:*:*", "matchCriteriaId": "FDC2D03A-A47C-4211-8FAA-D357E9B98EFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.18:cert1:*:*:*:*:*:*", "matchCriteriaId": "05795EED-0473-4806-A9AD-FD92212CCC77", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.18:cert1-rc1:*:*:*:*:*:*", "matchCriteriaId": "538C22F0-4DC4-463E-950C-3594E2935B78", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.18:cert1-rc2:*:*:*:*:*:*", "matchCriteriaId": "3C3D4786-5B7C-4F8B-9EBE-1C13599EC906", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.18:cert1-rc3:*:*:*:*:*:*", "matchCriteriaId": "03C662D2-48CF-41DD-BE6B-C2A961C32D13", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.18:cert2:*:*:*:*:*:*", "matchCriteriaId": "C3F701AA-E842-4680-9747-000C3A4F6E4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.18:cert3:*:*:*:*:*:*", "matchCriteriaId": "4B0FC294-F910-491B-9DEF-9FFEACA208C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.18:cert4:*:*:*:*:*:*", "matchCriteriaId": "B69E9C34-4F57-4948-9D53-0856E00F7949", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.21:cert1:*:*:*:*:*:*", "matchCriteriaId": "B7EE2BD3-51DC-4DA5-A5F2-6275F5277BE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.21:cert1-rc1:*:*:*:*:*:*", "matchCriteriaId": "DC85AF18-A304-4BD8-AFAA-F99AC37A799B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.21:cert1-rc2:*:*:*:*:*:*", "matchCriteriaId": "03094F8E-FF0C-4831-A50F-B601949FD3BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.21:cert2:*:*:*:*:*:*", "matchCriteriaId": "6A7B650A-4785-4A8B-BCB6-1B630A0E18E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.21:cert3:*:*:*:*:*:*", "matchCriteriaId": "6B791DBB-EB45-4E9C-9C57-249D196EC0E5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2404213-CAA0-4E84-9D73-7DC8D7DCB558", "versionEndExcluding": "13.27.1", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7B32887-22B1-4B06-A18D-0C8B690CA699", "versionEndExcluding": "15.7.3", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B58771D-C37A-487D-8B82-C63F7F45E217", "versionEndExcluding": "16.4.1", "versionStartIncluding": "16.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Asterisk Open Source through 13.27.0, 14.x and 15.x through 15.7.2, and 16.x through 16.4.0, and Certified Asterisk through 13.21-cert3. A pointer dereference in chan_sip while handling SDP negotiation allows an attacker to crash Asterisk when handling an SDP answer to an outgoing T.38 re-invite. To exploit this vulnerability an attacker must cause the chan_sip module to send a T.38 re-invite request to them. Upon receipt, the attacker must send an SDP answer containing both a T.38 UDPTL stream and another media stream containing only a codec (which is not permitted according to the chan_sip configuration)." }, { "lang": "es", "value": "Se detect\u00f3 un problema en Asterisk Open Source hasta versiones 13.27.0, 14.x y 15.x hasta 15.7.2, y versiones 16.x hasta 16.4.0, y Certified Asterisk hasta versi\u00f3n 13.21-cert3. Una desreferencia de puntero en chan_sip durante el manejo de la negociaci\u00f3n SDP permite a un atacante bloquear Asterisk cuando maneja una respuesta SDP en una re-invitaci\u00f3n T.38 saliente. Para explotar esta vulnerabilidad un atacante debe hacer que el m\u00f3dulo chan_sip les env\u00ede una petici\u00f3n de re-invitaci\u00f3n T.38. Una vez recibida, el atacante debe enviar una respuesta SDP que contenga tanto un flujo UDPTL T.38 como otro flujo multimedia que contenga solo un c\u00f3dec (lo que no est\u00e1 permitido de acuerdo a la configuraci\u00f3n de chan_sip)." } ], "id": "CVE-2019-13161", "lastModified": "2024-11-21T04:24:19.633", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-12T20:15:11.127", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.digium.com/pub/security/AST-2019-003.html" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-28465" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00038.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.digium.com/pub/security/AST-2019-003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-28465" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00038.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00001.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-07-30 14:15
Modified
2024-11-21 06:07
Severity ?
Summary
An issue was discovered in Sangoma Asterisk 13.x before 13.38.3, 16.x before 16.19.1, 17.x before 17.9.4, and 18.x before 18.5.1, and Certified Asterisk before 16.8-cert10. If the IAX2 channel driver receives a packet that contains an unsupported media format, a crash can occur.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digium | asterisk | * | |
digium | asterisk | * | |
digium | asterisk | * | |
digium | asterisk | * | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 11.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D4276A5-AE30-4AE2-9DC2-4742063B1DAA", "versionEndExcluding": "13.38.3", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEDB7BB2-CA84-4AF4-A91A-37FCDAED7E7D", "versionEndExcluding": "16.19.1", "versionStartIncluding": "16.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "35D9931E-4BDC-4679-A879-21C59F79E85C", "versionEndExcluding": "17.9.4", "versionStartIncluding": "17.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "4452C0A6-3082-4F14-96B0-73CC70EF1277", "versionEndExcluding": "18.15.1", "versionStartIncluding": "18.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:-:*:*:*:*:*:*", "matchCriteriaId": "81C3E390-8B99-4EB8-82DD-02893611209A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc1:*:*:*:*:*:*", "matchCriteriaId": "17DB2297-1908-4F87-8046-2BAA74569D71", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc2:*:*:*:*:*:*", "matchCriteriaId": "CEA2CC40-C2F6-4828-82F0-1B50D3E61F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc3:*:*:*:*:*:*", "matchCriteriaId": "32F19F43-C1E8-4B6C-9356-AF355B7320BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc4:*:*:*:*:*:*", "matchCriteriaId": "21D1FA32-B441-485F-8AE9-F3A394626909", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert2:*:*:*:*:*:*", "matchCriteriaId": "F7795CCF-B160-4B4F-9529-1192C11D7FDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert3:*:*:*:*:*:*", "matchCriteriaId": "0C5E5D0D-9EB3-40FD-8B7E-E93A95D07AB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert4:*:*:*:*:*:*", "matchCriteriaId": "C7DFDA30-DD61-4BBC-AFE4-448BF2A4F303", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc1:*:*:*:*:*:*", "matchCriteriaId": "142F1F89-49AC-4A0B-A273-61F697063A5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc2:*:*:*:*:*:*", "matchCriteriaId": "53041795-788C-4914-A2F6-41539ABE0244", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc3:*:*:*:*:*:*", "matchCriteriaId": "FBB98E65-B2D0-49A4-8BF3-12155E3E13C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc4:*:*:*:*:*:*", "matchCriteriaId": "769C854C-03CD-40A9-B39B-C0CDCA8252EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert5:*:*:*:*:*:*", "matchCriteriaId": "6D86AD6E-4E07-48B0-88D8-E18F277FFE6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert6:*:*:*:*:*:*", "matchCriteriaId": "7A643445-8A73-4ACC-8A96-CA8D6AC8B229", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert7:*:*:*:*:*:*", "matchCriteriaId": "BD980324-52E2-4D3E-B8D8-52A2DB100306", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert8:*:*:*:*:*:*", "matchCriteriaId": "4D5B8321-033A-47C5-A277-BE056C5ADB30", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert9:*:*:*:*:*:*", "matchCriteriaId": "12A2585A-A13F-4FD5-9A65-273B7D8A99C8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Sangoma Asterisk 13.x before 13.38.3, 16.x before 16.19.1, 17.x before 17.9.4, and 18.x before 18.5.1, and Certified Asterisk before 16.8-cert10. If the IAX2 channel driver receives a packet that contains an unsupported media format, a crash can occur." }, { "lang": "es", "value": "Se ha detectado un problema en Sangoma Asterisk versiones: 13.x anteriores a 13.38.3, versiones 16.x anteriores a 16.19.1, versiones 17.x anteriores a 17.9.4, y versiones 18.x anteriores a 18.5.1, y Certified Asterisk versiones anteriores a 16.8-cert10. Si el controlador del canal IAX2 recibe un paquete que contiene un formato de medios no compatible, puede ocurrir un bloqueo" } ], "id": "CVE-2021-32558", "lastModified": "2024-11-21T06:07:16.057", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-30T14:15:16.910", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/163639/Asterisk-Project-Security-Advisory-AST-2021-008.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Jul/49" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/AST-2021-008.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-29392" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00005.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4999" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/163639/Asterisk-Project-Security-Advisory-AST-2021-008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Jul/49" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/AST-2021-008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-29392" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4999" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-09-22 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
SQL injection vulnerability in the Call Detail Record (CDR) logging functionality for Asterisk allows remote attackers to execute arbitrary SQL via a CallerID string.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.atstake.com/research/advisories/2003/a091103-1.txt | Exploit, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.atstake.com/research/advisories/2003/a091103-1.txt | Exploit, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:0.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "8C08E661-23D9-437F-844F-6BE8183CF3CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:0.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "1D030C12-C2C6-4714-B776-2EF7ECF1A591", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:0.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "CE5A8210-2E7C-465C-9751-CB362AADC224", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:0.1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "82621C2B-B5F0-4E70-A619-0213005DADB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9750B74B-F766-4869-880B-4E5E41D90533", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "33DCA1D9-0D47-4F0A-A78F-F85FADE0C9B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "ACC453F5-C46A-45E9-B7DE-3C5BF752F305", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in the Call Detail Record (CDR) logging functionality for Asterisk allows remote attackers to execute arbitrary SQL via a CallerID string." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n de SQL en la funcionalidad de registro Call Detail Record (CDR) de Asterisk permite a atacantes remotos ejecutra SQL arbitrario mediante una cadena CallerID." } ], "id": "CVE-2003-0779", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-09-22T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.atstake.com/research/advisories/2003/a091103-1.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.atstake.com/research/advisories/2003/a091103-1.txt" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-07-06 19:55
Modified
2025-04-11 00:51
Severity ?
Summary
chan_iax2.c in the IAX2 channel driver in Asterisk Open Source 1.4.x before 1.4.41.1, 1.6.2.x before 1.6.2.18.1, and 1.8.x before 1.8.4.3, and Asterisk Business Edition C.3 before C.3.7.3, accesses a memory address contained in an option control frame, which allows remote attackers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a crafted frame.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6344E43-E8AA-4340-B3A7-72F5D6A5D184", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "4C170C1C-909D-4439-91B5-DB1A9CD150C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EE821BE5-B1D3-4854-A700-3A83E5F15724", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "149C57CA-0B4B-4220-87FC-432418D1C393", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "035595D5-BBEC-4D85-AD7A-A2C932D2BA70", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "6DAF5655-F09F-47F8-AFA6-4B95F77A57F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F8E001D8-0A7B-4FDD-88E3-E124ED32B81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9D5CFFBD-785F-4417-A54A-F3565FD6E736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "D30EF999-92D1-4B19-8E32-1E4B35DE4EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "A67D156B-9C43-444F-ADEC-B21D99D1433C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "893EB152-6444-43DB-8714-9735354C873A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8447EE7-A834-41D7-9204-07BD3752870C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C04F2C9-5672-42F2-B664-A3EE4C954C29", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "33465668-4C91-4619-960A-D26D77853E53", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "CAD08674-0B44-44EA-940B-6812E2D5077D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "EEE87710-A129-43AA-BA08-8001848975FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F582C6E-5DA0-4D72-A40E-66BDBC5CF2B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CEBB8-01B3-4A05-AFE8-37A143C9833E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "522733A7-E89E-4BFD-AC93-D6882636E880", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "2FAC47DD-B613-43E4-B9BF-6120B81D9789", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "86D20CB5-60E8-405E-B387-CF80C7DA5E07", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "71AB5A01-5961-4053-9111-CF32C6473A00", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*", "matchCriteriaId": "77D8E1DC-041F-4B87-AF9A-E0EC4D6A4BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7CCCB892-30CE-4BEF-904E-5D957F94D0EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "F156798F-F2EF-4366-B17E-03165AB437D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "9EFBB9A6-DD1D-436E-919F-74A3E4F40396", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "054E34C8-B6A5-48C7-938E-D3C268E0E8BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*", "matchCriteriaId": "1DCECA72-533A-4A95-AB19-20C5F09A1B01", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*", "matchCriteriaId": "0E2309F8-AFEE-4150-99D1-BA606432ED73", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*", "matchCriteriaId": "7785F282-BFA0-400A-8398-872ACCA4BF37", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1278D3FB-78C6-4F7D-A845-0A93D4F6E2B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "C00A6EFB-A848-46D3-AAD7-FD8140007E42", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1F8B700A-FACB-4BC8-9DF2-972DC63D852B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FFD31B9B-2F43-4637-BE56-47A807384BF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "E6450D6B-C907-49E6-9788-E4029C09285F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "DDB0432E-024A-4C0C-87FF-448E513D2834", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "D6A6A343-FEA2-49E5-9858-455AE3B29470", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc6:*:*:*:*:*:*", "matchCriteriaId": "D57B94E3-EA37-466C-ADC4-5180D4502FDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc7:*:*:*:*:*:*", "matchCriteriaId": "64D35A89-6B21-4770-AA0F-424C5C91A254", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc8:*:*:*:*:*:*", "matchCriteriaId": "14817302-A34A-4980-B148-AEB4B3B49BE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "61FDFA96-E62A-413B-9846-F51F1F7349EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "DA924386-49F6-4371-B975-B1473EEA12F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "B74A1B99-8901-4690-B994-1DAD3EFA5ABB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "4253C7DD-3588-4B35-B96D-C027133BE93F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "24AE11DB-16D3-42BF-BC64-E8982107D35B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "53841D77-926C-4362-BC85-BD8B6AC4391D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "F98FD6E6-EDE9-437D-B7C2-2DB65B73D230", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "4BA6CA77-D358-4623-8400-78EFC47ADB7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "B4E62DAB-45E0-4EAA-8E45-6D3757A679D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.15:rc1:*:*:*:*:*:*", "matchCriteriaId": "1355578C-B384-401A-9123-2789CBECAD0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "3491F8DB-A162-4608-B5F9-5401FE058CEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16:rc1:*:*:*:*:*:*", "matchCriteriaId": "C52730A8-D96E-46C1-8905-1D78A93E9C84", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "C6E5CD17-B14A-4BDB-BA75-261344FF6F25", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "63C8DBF5-6992-4618-BD2D-56F1F98EAE3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "EEED6C07-CFB7-44DC-9A41-9B6271942123", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:rc1:*:*:*:*:*:*", "matchCriteriaId": "0864DAF9-B7FA-4018-99F4-F2A7AA6FBBB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:rc2:*:*:*:*:*:*", "matchCriteriaId": "694B257B-E73B-4534-B316-87284FA45534", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:rc3:*:*:*:*:*:*", "matchCriteriaId": "418FD91F-014E-4529-8D72-D3FB27788EEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "D213EC93-0D4F-4BD9-9F13-9A9E705135EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17.2:*:*:*:*:*:*:*", "matchCriteriaId": "2E9D2091-B292-4D6E-A91F-58D24BD5A5E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17.3:*:*:*:*:*:*:*", "matchCriteriaId": "CFF196A0-87E1-4DD2-8CDA-B19EB6F71312", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "6F59B7C5-8EF3-495E-9A91-9C96E6DF41E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.18:rc1:*:*:*:*:*:*", "matchCriteriaId": "D9020FF4-645B-4E98-8CB0-3F8DF7C5841B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E56DB29-571D-4615-B347-38CF4590E463", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "FC1188DA-6C27-48D2-9CE7-74D77B24EE9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "A93B8F91-5C56-44DE-AE29-8468E853759F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "BF7F4D02-7C8E-403C-A53E-A5F8C07F33A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "D85031A3-3444-4650-905D-721F1EBAA24F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "6F0AC2B3-6E8A-4B26-8A6C-792D9E5072C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "2BC8D6D4-A389-4A78-8DA8-351A9CB896E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "5E979AC4-58EA-4297-9F90-350924BBE440", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "3A58CCD3-4A0C-468B-85F2-59A52B7293A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "3542DB91-8487-49D6-AA15-E8FD9D6B99D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "6BA4F3F1-C3F1-4E15-A854-9BB84E33E4AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "661D710E-79F0-4E98-B35B-ED0549D35C24", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "68291ADE-F9D1-427B-B150-FDA7F2F4788B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F80CBCB-F58D-4BE7-8E78-67E04C900D01", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "EB61D32E-3400-480E-BD27-BA3F98F94427", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "D9154EDB-CAE6-4BB0-8D02-9EC2B81D93C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "A432B0A7-F158-4B9C-97F6-6A29DB13EAFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "687C67CB-46AF-40C2-8A02-081C7F78568A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "6E8D6EC0-A61E-4DBC-A0C7-864E9C4BDA1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EF7F65A-45FD-4586-901E-49B057100BB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "300F158E-ED27-46C8-85E4-AA0AA6B201DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "FB6F04C0-3226-4D2C-97A3-39999483C62C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "30685A20-963A-48D4-B7D7-2C11C2C812AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "C54C3AAC-4D5D-4661-86AB-6849982E8C67", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "6F847916-89F1-4AA6-973D-6002C8B54EE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "5359815E-671A-4DFD-9E99-8CF903A03C84", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "E2EFBC9E-4DCA-43CB-93EB-6807E2383A98", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.18:*:*:*:*:*:*:*", "matchCriteriaId": "98755B1B-CAD5-4AC5-8571-52E67C3A8274", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:*:*:*:*:*:*:*", "matchCriteriaId": "C9D8C8FE-3D09-4F60-AD03-9D4439942141", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc1:*:*:*:*:*:*", "matchCriteriaId": "902FBE4B-5237-43CD-8EB6-D2CAC0F30879", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc2:*:*:*:*:*:*", "matchCriteriaId": "708DCACA-49EC-468D-81EC-CE5367F8A164", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc3:*:*:*:*:*:*", "matchCriteriaId": "BA9E3314-7D23-414C-8187-16D807410B62", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc4:*:*:*:*:*:*", "matchCriteriaId": "D824ED7B-BAB6-4C0F-A6B0-A75AB072EC0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A01CE63-F834-48B2-826D-2DAD1B4AE8C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "88B9CC9D-3DC2-4674-BA52-4C6D4E2056C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:*:*:*:*:*:*:*", "matchCriteriaId": "43F1849F-1230-45E7-B6A3-D6FC72EB0F11", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc1:*:*:*:*:*:*", "matchCriteriaId": "873C9C7E-93A3-4269-B19C-AB33A21C1AC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc2:*:*:*:*:*:*", "matchCriteriaId": "457F2112-7C5E-4953-8F4C-117925D486DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc3:*:*:*:*:*:*", "matchCriteriaId": "BD15ADD6-D7FA-441A-A9BC-487BCC15F2A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "792A8901-B7B8-40E8-9258-6338B72770FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:*:*:*:*:*:*:*", "matchCriteriaId": "0E6C8F78-0C00-45A5-8FEB-2A4BD5AC1A37", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:rc1:*:*:*:*:*:*", "matchCriteriaId": "F3E04247-C4EF-4C1B-B879-5C02986950D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:rc2:*:*:*:*:*:*", "matchCriteriaId": "5E382FC8-4001-4058-9151-05AE98B4A35E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "11FECE6B-B6A6-4DDA-9019-9A10B05EC1F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "D9813D27-0688-4989-99EB-1DC0F82D59F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:*:*:*:*:*:*:*", "matchCriteriaId": "D4333904-9D21-4149-965F-F49F0A34BD85", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc1:*:*:*:*:*:*", "matchCriteriaId": "F7180626-F0FD-46F3-AD52-5C67525C4B46", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc2:*:*:*:*:*:*", "matchCriteriaId": "85A1E3A3-C157-4F3D-9477-F63771E7F627", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc3:*:*:*:*:*:*", "matchCriteriaId": "FEE739CC-7A9C-489E-BFC0-6257129C043D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc4:*:*:*:*:*:*", "matchCriteriaId": "ADC0E947-A95A-44ED-8DED-CC769FF00569", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc5:*:*:*:*:*:*", "matchCriteriaId": "DE52BD9F-3728-455C-BC45-1A4DB926FFE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22.1:*:*:*:*:*:*:*", "matchCriteriaId": "1EF82D41-9222-42D3-ADAD-94B4F950C63F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AE9F181-A8E4-4700-A30F-211CDE251606", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:*:*:*:*:*:*:*", "matchCriteriaId": "5B10AE4B-EC2D-4D5B-B842-50F5097A0650", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc1:*:*:*:*:*:*", "matchCriteriaId": "83E854D0-17A2-473B-B7E8-41E6447C81DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc2:*:*:*:*:*:*", "matchCriteriaId": "47169133-3854-4D8F-B79E-3CC77A166EF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc3:*:*:*:*:*:*", "matchCriteriaId": "6071601F-CF37-4E66-9D6D-AFC3434C18AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc4:*:*:*:*:*:*", "matchCriteriaId": "2A575824-E005-4820-824A-4875594619E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "080C7089-5662-4A94-9842-C4A26095DA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23.2:*:*:*:*:*:*:*", "matchCriteriaId": "7AE38697-0B16-4032-9234-CA263E4A9885", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.24:*:*:*:*:*:*:*", "matchCriteriaId": "DCB18BE2-B073-429C-ABE7-B8305793DAE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.24:rc1:*:*:*:*:*:*", "matchCriteriaId": "FA7216BA-A42F-4ED8-8086-B4FA483FDAB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "CB7D2048-CD61-46C0-830B-11976B275783", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.25:*:*:*:*:*:*:*", "matchCriteriaId": "8DBA63FE-62AF-4F3D-B30C-550D17C4E35F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.25:rc1:*:*:*:*:*:*", "matchCriteriaId": "AD0A0F19-020D-4578-9023-12B0CB646D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.25.1:*:*:*:*:*:*:*", "matchCriteriaId": "96D5A1E3-FF0B-4C71-AA51-655D7106880D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:*:*:*:*:*:*:*", "matchCriteriaId": "E5D425E6-E2E5-4452-9EAA-2697C1155784", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc1:*:*:*:*:*:*", "matchCriteriaId": "9855FA26-0930-4AC9-A920-B394F6916349", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc2:*:*:*:*:*:*", "matchCriteriaId": "BBA21246-7DF4-41BC-998A-05D38FC97C8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc3:*:*:*:*:*:*", "matchCriteriaId": "EE9A7984-22C9-4296-8E44-C010E67F193D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc4:*:*:*:*:*:*", "matchCriteriaId": "51B2C42A-C252-4BD8-A908-8F30C2BF15E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc5:*:*:*:*:*:*", "matchCriteriaId": "2137CEAD-0F19-43C5-A26D-1972564FCD8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc6:*:*:*:*:*:*", "matchCriteriaId": "B7552466-B782-4F16-8561-A2A51E94FED4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26.1:*:*:*:*:*:*:*", "matchCriteriaId": "C2F8C82D-3031-4C62-89FA-3BF56EA29727", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26.2:*:*:*:*:*:*:*", "matchCriteriaId": "B3074CEA-46BD-4CAD-BF5C-10008A80E434", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6AB8988-FCC6-407A-A7D9-2F7A3A7488B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E06848DE-6EE1-4FD0-A14F-39D41B2F3E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc1:*:*:*:*:*:*", "matchCriteriaId": "CF342950-FDD7-41A9-94D5-EDF41130B61E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc2:*:*:*:*:*:*", "matchCriteriaId": "6E4543AA-3D54-4444-AD1F-381A87A89DA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc3:*:*:*:*:*:*", "matchCriteriaId": "AF3036DD-261C-4975-A01E-92CD29479588", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc4:*:*:*:*:*:*", "matchCriteriaId": "EF07C116-27DC-4875-9DCF-049E2A8EAEA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc5:*:*:*:*:*:*", "matchCriteriaId": "88FBC328-538A-4484-A342-1688D9669B9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27.1:*:*:*:*:*:*:*", "matchCriteriaId": "CBF2301E-F6EF-4D28-82EE-FA1AB8CA9E43", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.28:*:*:*:*:*:*:*", "matchCriteriaId": "A53F637C-846A-43FC-BA71-C8571648FA46", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.28:rc1:*:*:*:*:*:*", "matchCriteriaId": "E61070F4-1B6B-4814-918E-459DE5119A24", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.29:*:*:*:*:*:*:*", "matchCriteriaId": "70664E0F-09CF-42C2-A7A7-E635D022E90D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.29:rc1:*:*:*:*:*:*", "matchCriteriaId": "D1E13E1A-C2D4-4E5A-84C8-E6AF061D67C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.29.1:*:*:*:*:*:*:*", "matchCriteriaId": "7E811134-B657-4C50-9AEF-A7F68CA5577A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.30:*:*:*:*:*:*:*", "matchCriteriaId": "4C4CD101-F079-4940-AA79-886B69A7A514", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.30:rc2:*:*:*:*:*:*", "matchCriteriaId": "B7B828E9-5BE3-4E6F-8048-F2B1F2E929CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.30:rc3:*:*:*:*:*:*", "matchCriteriaId": "75BB2066-74A6-4F89-B54C-35F234DC1F03", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.31:*:*:*:*:*:*:*", "matchCriteriaId": "FE522334-BF53-4E34-949B-CD928B59A341", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.31:rc1:*:*:*:*:*:*", "matchCriteriaId": "648DEC0E-3CBC-4EA2-AF27-2C518B0762CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.31:rc2:*:*:*:*:*:*", "matchCriteriaId": "B50F4BAE-D00D-4352-B52B-BE1A9FFB6949", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.32:*:*:*:*:*:*:*", "matchCriteriaId": "E7A35508-8235-4915-8810-12B2630C82C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.32:rc1:*:*:*:*:*:*", "matchCriteriaId": "63DD4EE5-6F56-41C7-9CB4-16ADF4F63B8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.33:*:*:*:*:*:*:*", "matchCriteriaId": "2347E451-2F89-4EA6-A6E0-22BCB0C8A56E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.33:rc1:*:*:*:*:*:*", "matchCriteriaId": "A86F5360-6FE4-4EA2-9208-076E78C842A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.33:rc2:*:*:*:*:*:*", "matchCriteriaId": "3CDFA85B-17A4-4ECC-9922-F5546917B4C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.33.1:*:*:*:*:*:*:*", "matchCriteriaId": "3D7D7DB7-32A7-490E-AED2-C404D371E7C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.34:*:*:*:*:*:*:*", "matchCriteriaId": "A03632BC-CA0F-42BD-8839-A72DB146A4A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.34:rc1:*:*:*:*:*:*", "matchCriteriaId": "9DC4EF64-6A1D-47CB-AC07-48CABB612DCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.34:rc2:*:*:*:*:*:*", "matchCriteriaId": "68C00FEF-7850-48F4-8122-4211D080B508", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.35:*:*:*:*:*:*:*", "matchCriteriaId": "D3A48F07-42E1-47E9-94EA-44D20A0BAC3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.35:rc1:*:*:*:*:*:*", "matchCriteriaId": "87D16470-5892-4289-BB35-B69100BCA31E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.36:*:*:*:*:*:*:*", "matchCriteriaId": "15E71BD7-83D1-4E2B-AD40-BB6B53056C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.36:rc1:*:*:*:*:*:*", "matchCriteriaId": "87FDE2E2-5F08-43EF-BBD8-7DCCC0C98870", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.37:*:*:*:*:*:*:*", "matchCriteriaId": "347E9D8C-A372-41F2-AB48-FFCAB454C9C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.37:rc1:*:*:*:*:*:*", "matchCriteriaId": "74F67E57-1DD0-4850-8D7E-7A9748BD106C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.38:*:*:*:*:*:*:*", "matchCriteriaId": "B208C056-B567-4BEE-A9B7-AEB394341D5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.38:rc1:*:*:*:*:*:*", "matchCriteriaId": "A0C3A2D4-07A9-4D28-AC18-03523E9FF34A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.39:*:*:*:*:*:*:*", "matchCriteriaId": "E6516E0F-9F60-4D20-88D3-B9CD8DC93062", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.39:rc1:*:*:*:*:*:*", "matchCriteriaId": "22147B91-45A4-4834-AC8D-2DC17A706BEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.39.1:*:*:*:*:*:*:*", "matchCriteriaId": "677C10DE-46D8-4EF1-BF22-63F3AE37CBC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.39.2:*:*:*:*:*:*:*", "matchCriteriaId": "E299CE20-B02D-4519-AC46-BB64B1E3826A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.40:*:*:*:*:*:*:*", "matchCriteriaId": "22FD16C3-7518-4208-8C0A-043C13C14A72", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.40:rc1:*:*:*:*:*:*", "matchCriteriaId": "2461B6B9-2C93-4D84-A1EE-C07AD32A9540", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.40:rc2:*:*:*:*:*:*", "matchCriteriaId": "C8A4CE2D-FBAB-4C35-846A-5B95BBCAD6BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.40:rc3:*:*:*:*:*:*", "matchCriteriaId": "30FFB6F4-1BC7-4D4C-9C65-A66CF514E321", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.40.1:*:*:*:*:*:*:*", "matchCriteriaId": "F745AF0A-D6A6-4429-BBBE-347BF41999BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.40.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC44F61B-AB96-4643-899B-19B9E3B4F05C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.41:*:*:*:*:*:*:*", "matchCriteriaId": "F788A255-CF21-424F-9F30-8A744CC16740", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.41:rc1:*:*:*:*:*:*", "matchCriteriaId": "92B8AA8E-D49B-4AD7-8AFC-BD4F9E9C7A16", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:c.3.0:-:business:*:*:*:*:*", "matchCriteriaId": "78E8936C-033B-49E6-BB39-D5BBBC80EB55", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.1.0:-:business:*:*:*:*:*", "matchCriteriaId": "5D05D04F-CD6C-4A73-885C-306D7A5CC7C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.1.1:-:business:*:*:*:*:*", "matchCriteriaId": "3805B5F3-A4CD-469F-9F8A-A271A79A2B7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.2.2:-:business:*:*:*:*:*", "matchCriteriaId": "9FAEBE5E-378A-40DC-B2B9-31F6D1305BCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.2.3:-:business:*:*:*:*:*", "matchCriteriaId": "617B3FE8-39E3-41C0-9348-9507DA43DE93", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.3.2:-:business:*:*:*:*:*", "matchCriteriaId": "04AB4C82-71BB-49B7-B4F3-4E75EFB5F1A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.6.2:-:business:*:*:*:*:*", "matchCriteriaId": "78B55176-E269-411B-974A-B5D2CE8E08C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.6.3:-:business:*:*:*:*:*", "matchCriteriaId": "9BCF12B0-4B8D-499D-B5DE-FB0CD9EEC3B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.6.4:-:business:*:*:*:*:*", "matchCriteriaId": "9ED68059-F0E5-4B1B-B633-466D92F38346", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "chan_iax2.c in the IAX2 channel driver in Asterisk Open Source 1.4.x before 1.4.41.1, 1.6.2.x before 1.6.2.18.1, and 1.8.x before 1.8.4.3, and Asterisk Business Edition C.3 before C.3.7.3, accesses a memory address contained in an option control frame, which allows remote attackers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a crafted frame." }, { "lang": "es", "value": "chan_iax2.c en el controlador de canal IAX2 en Asterisk Open Source v1.4.x anteriores a v1.4.41.1, v1.6.2.x anteriores a v1.6.2.18.1, y v1.8.x anteriores a v1.8.4.3, y Asterisk Business Edition vC.3 anteriores a vC.3.7.3, accede a una direcci\u00f3n de memoria contenida en un marco de control de opci\u00f3n, que permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda del demonio) o posiblemente tener un impacto no especificado a trav\u00e9s de un marco manipulado." } ], "id": "CVE-2011-2535", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-07-06T19:55:03.497", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://downloads.asterisk.org/pub/security/AST-2011-010-1.8.diff" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2011-010.html" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062628.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/44973" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/45048" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/45201" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/45239" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1025708" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2276" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/73309" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/48431" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68205" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://downloads.asterisk.org/pub/security/AST-2011-010-1.8.diff" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2011-010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062628.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/44973" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/45048" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/45201" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/45239" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1025708" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2276" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/73309" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48431" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68205" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-09-09 17:55
Modified
2025-04-11 00:51
Severity ?
Summary
The SIP channel driver (channels/chan_sip.c) in Asterisk Open Source 1.8.17.x through 1.8.22.x, 1.8.23.x before 1.8.23.1, and 11.x before 11.5.1 and Certified Asterisk 1.8.15 before 1.8.15-cert3 and 11.2 before 11.2-cert2 allows remote attackers to cause a denial of service (NULL pointer dereference, segmentation fault, and daemon crash) via an ACK with SDP to a previously terminated channel. NOTE: some of these details are obtained from third party information.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "6F368897-A481-42DD-A8B0-8AD43A5FD68B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6BA8F4AF-26C0-4A69-B489-16E7A56E5123", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FE82D53D-092D-4B36-A979-23E9A5E07A78", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "27365383-72DB-4683-9A67-CF553FF2620A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "46EE63D4-CA9C-4DF4-AF85-B8AC2E3F844A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "91407E03-4E98-4DD9-B584-E5BB74F09B9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "669CC22C-45E5-40AB-9A95-D7DFD694B688", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "80A38E0C-45D9-4353-8426-87A4CFA371DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "54A934AE-AB7C-4D10-8BA2-9C54410C648F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "7A7C5A8E-35E6-4B86-8502-1970031AB987", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "1FA4C14B-A01C-4CFE-8985-317ACCDAD209", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "1224686C-8A1E-40E1-ACB9-87F571641EAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "619704FF-2F0C-47E8-A340-58135CEE6B89", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E412E336-871A-4CAC-97E5-FB203BB9349D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.21.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "FC1A0E66-63F4-4BD0-8C9A-3D23A116EE08", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.21.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "79963FF0-5ED6-41B6-8E60-146BD7879518", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "B63FB1C5-9704-4C6A-8DE6-2283D1993BA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.22.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0787BC7B-9464-4AAA-896B-C028ECF8E397", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.22.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "84C0FBC8-9CD1-4135-94C7-BE90A7C94625", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "DE14D16B-4903-47BD-BCBD-28A8B6B878E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "FD3948A1-B5A6-4702-9187-A7720E81B7F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "BC097BB6-02E9-4F48-98CB-B5F31B41009C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F53B8453-F35A-49BE-8129-774BADF71BA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "CCB0C07E-DA2F-4169-848D-C3315CDC1CB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "410C43E6-5912-4C22-A592-7CF94402EEB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D50A355E-1B55-4DD2-8100-EB81AA6FC40E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "9ADF4230-EFEB-45EC-9C96-0262B4A3E459", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "5234531C-F69A-4B94-A480-147734206C5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "321C1066-6800-4488-A7C4-BE91FF738453", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9B51588-50A2-40B2-A007-06F57D38C7AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CDE2B00C-6AC0-4166-8A25-EFC42CE7F737", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "617FC4AF-D152-4EE1-828D-C2A6AD0DFD3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3A3FE6DC-17FD-4CEE-BDFB-9D4685640381", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8CEEB6C2-0A6D-4434-8446-CB8605CD3B14", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "1548C574-CD51-49F6-91B1-B06C504000E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D56C2C11-4B42-43AB-9DAE-61C15D107160", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "69F2DED4-39F5-44C8-BEA3-22692D28C631", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "AD172E70-238B-4B01-A922-8021B5627092", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "C689A32B-E87D-492F-B3F6-7B80DFA049C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5FB3863D-7F46-4C4A-9E6B-C255CDF0D953", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "7239304D-C383-4F26-BB08-65ADD2380015", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "1AC153C2-258E-4EE6-845F-8E8C68AA242D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "229B7982-9775-42AA-B8F5-FE920CCAA497", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "326845DF-2DB2-406B-BE0F-877384DAACFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.5.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E0FC2D46-FD1B-421F-8773-BB41B1E9A831", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "8788AF7B-CBB6-4D9D-A748-486787935A96", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:*:*:*:*:*:*:*", "matchCriteriaId": "E6DDE265-B4B9-495A-95F7-0910E8199980", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1:*:*:*:*:*:*", "matchCriteriaId": "2365F1EE-16A4-4293-B80E-A51CD6A2F112", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1-rc1:*:*:*:*:*:*", "matchCriteriaId": "6B7AE7FB-8170-41AD-9597-07335D36AE48", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1-rc2:*:*:*:*:*:*", "matchCriteriaId": "9131FB32-E3F0-476C-A0D1-36E2101631D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1-rc3:*:*:*:*:*:*", "matchCriteriaId": "5209356B-4A86-4C93-9D04-C66969F23BC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert2:*:*:*:*:*:*", "matchCriteriaId": "F087C546-FBCA-4D0D-A023-8F9384CD160C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:rc1:*:*:*:*:*:*", "matchCriteriaId": "9AF5750B-2348-4E35-9F08-27E2385E329F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C0344FE7-952A-4BC5-A31F-F2C5EABDB5FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.2.0:cert1:*:*:*:*:*:*", "matchCriteriaId": "960521C4-9004-4412-8A38-66240C4B875D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "00F26342-110F-4163-AD11-98AA3B71D299", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "8652FA73-2F02-401C-890F-0544276294D3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SIP channel driver (channels/chan_sip.c) in Asterisk Open Source 1.8.17.x through 1.8.22.x, 1.8.23.x before 1.8.23.1, and 11.x before 11.5.1 and Certified Asterisk 1.8.15 before 1.8.15-cert3 and 11.2 before 11.2-cert2 allows remote attackers to cause a denial of service (NULL pointer dereference, segmentation fault, and daemon crash) via an ACK with SDP to a previously terminated channel. NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "El controlador de canal SIP (channel/chan_sip.c) en Asterisk Open Source 1.8.17.x hasta 1.8.22.x, 1.8.23.x (anteriores a 1.8.23.1), y 11.x (anteriores a 11.5.1); y Certified Asterisk 1.8.15 (anteriores a 1.8.15-cert3) y 11.2 (anteriores a 11.2-cert2) permiten a un atacante remoto causar una denegaci\u00f3n de servicio (referencia a puntero nulo, corrupci\u00f3n de memoria y ca\u00edda del demonio) a trav\u00e9s de un ACK con SDP a un canal previamente cerrado. \n\nNOTA: algunos de estos detalles fueron obtenidos de informaci\u00f3n de terceros." } ], "id": "CVE-2013-5641", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-09-09T17:55:06.237", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2013-08/0175.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://downloads.asterisk.org/pub/security/AST-2013-004.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/96691" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://seclists.org/bugtraq/2013/Aug/185" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54534" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/54617" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2013/dsa-2749" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:223" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/62021" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1028956" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-21064" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2013-08/0175.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://downloads.asterisk.org/pub/security/AST-2013-004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/96691" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://seclists.org/bugtraq/2013/Aug/185" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54534" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/54617" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2013/dsa-2749" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:223" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/62021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1028956" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-21064" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-12-27 17:08
Modified
2025-04-20 01:37
Severity ?
Summary
An issue was discovered in Asterisk 13.18.4 and older, 14.7.4 and older, 15.1.4 and older, and 13.18-cert1 and older. A select set of SIP messages create a dialog in Asterisk. Those SIP messages must contain a contact header. For those messages, if the header was not present and the PJSIP channel driver was used, Asterisk would crash. The severity of this vulnerability is somewhat mitigated if authentication is enabled. If authentication is enabled, a user would have to first be authorized before reaching the crash point.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://downloads.asterisk.org/pub/security/AST-2017-014.html | Vendor Advisory | |
cve@mitre.org | http://www.securitytracker.com/id/1040056 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://issues.asterisk.org/jira/browse/ASTERISK-27480 | Issue Tracking, Vendor Advisory | |
cve@mitre.org | https://security.gentoo.org/glsa/201811-11 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://downloads.asterisk.org/pub/security/AST-2017-014.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040056 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://issues.asterisk.org/jira/browse/ASTERISK-27480 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201811-11 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digium | asterisk | * | |
digium | asterisk | * | |
digium | asterisk | * | |
digium | certified_asterisk | 13.1.0 | |
digium | certified_asterisk | 13.1.0 | |
digium | certified_asterisk | 13.1.0 | |
digium | certified_asterisk | 13.8 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "FEE78C41-D7BE-4910-BB77-3DFB63690382", "versionEndIncluding": "13.18.4", "versionStartIncluding": "13.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "A845013E-DD73-45F2-A962-6F0A580A4E95", "versionEndIncluding": "14.7.4", "versionStartIncluding": "14.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "09447B7F-89BA-4FD5-8E6F-A166681A22F7", "versionEndIncluding": "15.1.4", "versionStartIncluding": "15.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9F68ED1E-8D2B-4AEE-B5DE-FD50338BA82D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "EA9F296A-4932-4EA4-8B38-80856A9D6374", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "B40673A6-2980-440A-B78E-D5C7095E3FA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.8:cert1:*:*:*:*:*:*", "matchCriteriaId": "38E19C8E-9FD6-4A44-81C6-EEC91BC2CB58", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Asterisk 13.18.4 and older, 14.7.4 and older, 15.1.4 and older, and 13.18-cert1 and older. A select set of SIP messages create a dialog in Asterisk. Those SIP messages must contain a contact header. For those messages, if the header was not present and the PJSIP channel driver was used, Asterisk would crash. The severity of this vulnerability is somewhat mitigated if authentication is enabled. If authentication is enabled, a user would have to first be authorized before reaching the crash point." }, { "lang": "es", "value": "Se ha descubierto un problema en Asterisk en versiones 13.18.4 y anteriores, 14.7.4 y anteriores, 15.1.4 y anteriores y 13.18-cert1 y anteriores. Un conjunto de mensajes SIP seleccionados crean un di\u00e1logo en Asterisk. Estos mensajes SIP deben contener una cabecera contact. Para estos mensajes, si la cabecera no estuviera presente y se utilizase el controlador de canal PJSIP, Asterisk se cerrar\u00eda de forma inesperada. La gravedad de esta vulnerabilidad se mitiga en cierta medida habilitando la autenticaci\u00f3n. Si se habilita la autenticaci\u00f3n, un usuario tendr\u00eda que estar autorizado antes de alcanzar el punto de cierre inesperado." } ], "id": "CVE-2017-17850", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-12-27T17:08:20.017", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2017-014.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040056" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27480" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/201811-11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2017-014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27480" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201811-11" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-22 17:15
Modified
2024-11-21 04:33
Severity ?
Summary
An issue was discovered in res_pjsip_t38.c in Sangoma Asterisk through 13.x and Certified Asterisk through 13.21-x. If it receives a re-invite initiating T.38 faxing and has a port of 0 and no c line in the SDP, a NULL pointer dereference and crash will occur. This is different from CVE-2019-18940.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digium | asterisk | * | |
digium | certified_asterisk | 13.21 | |
digium | certified_asterisk | 13.21 | |
digium | certified_asterisk | 13.21 | |
digium | certified_asterisk | 13.21 | |
digium | certified_asterisk | 13.21 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE39000C-238B-45D9-A2C0-9907A7FB4C36", "versionEndIncluding": "13.29.1", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.21:*:*:*:*:*:*:*", "matchCriteriaId": "8F9D13EC-820A-4D7E-9AB1-F81DCFF324DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.21:cert1:*:*:*:*:*:*", "matchCriteriaId": "B7EE2BD3-51DC-4DA5-A5F2-6275F5277BE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.21:cert2:*:*:*:*:*:*", "matchCriteriaId": "6A7B650A-4785-4A8B-BCB6-1B630A0E18E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.21:cert3:*:*:*:*:*:*", "matchCriteriaId": "6B791DBB-EB45-4E9C-9C57-249D196EC0E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.21:cert4:*:*:*:*:*:*", "matchCriteriaId": "BF36760E-856B-4D74-98BF-129323E9306B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in res_pjsip_t38.c in Sangoma Asterisk through 13.x and Certified Asterisk through 13.21-x. If it receives a re-invite initiating T.38 faxing and has a port of 0 and no c line in the SDP, a NULL pointer dereference and crash will occur. This is different from CVE-2019-18940." }, { "lang": "es", "value": "Se detect\u00f3 un problema en el archivo res_pjsip_t38.c en Sangoma Asterisk versiones hasta 13.x y Certified Asterisk versiones hasta 13.21-x. Si recibe una nueva invitaci\u00f3n para iniciar el env\u00edo de faxes T.38 y tiene un puerto de 0 y sin l\u00ednea c en el SDP, se producir\u00e1 una desreferencia del puntero NULL y un bloqueo. Esto es diferente de CVE-2019-18940." } ], "id": "CVE-2019-18976", "lastModified": "2024-11-21T04:33:55.320", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-22T17:15:11.833", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2019-008.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://packetstormsecurity.com/files/155436/Asterisk-Project-Security-Advisory-AST-2019-008.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/fulldisclosure/2019/Nov/20" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.asterisk.org/downloads/security-advisories" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.cybersecurity-help.cz/vdb/SB2019112218?affChecked=1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2019-008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://packetstormsecurity.com/files/155436/Asterisk-Project-Security-Advisory-AST-2019-008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/fulldisclosure/2019/Nov/20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.asterisk.org/downloads/security-advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.cybersecurity-help.cz/vdb/SB2019112218?affChecked=1" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-09-24 22:29
Modified
2024-11-21 03:54
Severity ?
Summary
There is a stack consumption vulnerability in the res_http_websocket.so module of Asterisk through 13.23.0, 14.7.x through 14.7.7, and 15.x through 15.6.0 and Certified Asterisk through 13.21-cert2. It allows an attacker to crash Asterisk via a specially crafted HTTP request to upgrade the connection to a websocket.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:lts:*:*:*", "matchCriteriaId": "8D9D833C-E847-48D0-9BC1-83B52294AF50", "versionEndIncluding": "13.23.0", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "6072FE25-86B3-4C45-841D-60BCB1817535", "versionEndIncluding": "14.7.7", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:standard:*:*:*", "matchCriteriaId": "3BF8E2D1-2583-4EC7-A274-605AB41CD3EC", "versionEndIncluding": "15.6.0", "versionStartIncluding": "15.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert12:*:*:lts:*:*:*", "matchCriteriaId": "BFFD88AD-C82E-4C5C-9C4F-8A49176E3E52", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert13:*:*:lts:*:*:*", "matchCriteriaId": "6797C78B-BB9A-46B4-8F0B-492FB1988BB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert14:*:*:lts:*:*:*", "matchCriteriaId": "10A38D53-6C8E-493E-8207-F4CF7D754A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert15:*:*:lts:*:*:*", "matchCriteriaId": "4CC0C753-9179-4C71-AFD8-C4601D8C865A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert16:*:*:lts:*:*:*", "matchCriteriaId": "169467F0-A818-4E58-884A-8409E376DCE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert17:*:*:lts:*:*:*", "matchCriteriaId": "DC59BE10-CFBF-43DC-99C8-81A20C020395", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert18:*:*:lts:*:*:*", "matchCriteriaId": "911BAB3E-20E4-4B34-80AC-94324BFA36BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1:cert3:*:*:lts:*:*:*", "matchCriteriaId": "F0AEB812-85F2-4030-A8F8-D96F72C22BEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1:cert4:*:*:lts:*:*:*", "matchCriteriaId": "2E91D289-8971-4259-A969-1597EDB51E78", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1:cert5:*:*:lts:*:*:*", "matchCriteriaId": "948496CC-B5D4-41E5-9560-F59183C99209", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1:cert6:*:*:lts:*:*:*", "matchCriteriaId": "1D2AD7E2-D830-48D3-9D7B-4B3D36884E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1:cert7:*:*:lts:*:*:*", "matchCriteriaId": "79F2CF46-8580-4AFC-AA40-42611C17AB77", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1:cert8:*:*:lts:*:*:*", "matchCriteriaId": "B6BC624E-D8A6-4E1F-B8B8-E4EB743AC1A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.8:cert1:*:*:lts:*:*:*", "matchCriteriaId": "0734E999-DC1E-4107-83D6-31A08F134168", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.8:cert2:*:*:lts:*:*:*", "matchCriteriaId": "2FE884C8-5ED3-4B4F-883A-DB7B503435D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.8:cert3:*:*:lts:*:*:*", "matchCriteriaId": "D64CD3D3-7EE0-4B0B-A66E-976CC7507CB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.8:cert4:*:*:lts:*:*:*", "matchCriteriaId": "CFA9BFA1-6C15-4702-B2AC-1E2D3E6B4312", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert1:*:*:lts:*:*:*", "matchCriteriaId": "4678389A-2EE0-49FC-AEA6-45CAEEF61F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert2:*:*:lts:*:*:*", "matchCriteriaId": "4100EF36-CDBB-493B-9D03-E1B70C5F055A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert3:*:*:lts:*:*:*", "matchCriteriaId": "859F4687-C937-476C-9DA6-2A0B18BEF3F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert4:*:*:lts:*:*:*", "matchCriteriaId": "10E6C1A9-2917-471F-92EB-249E25F234C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert5:*:*:lts:*:*:*", "matchCriteriaId": "76C3CE8D-C4FC-4A1B-AC6A-5C27BE836DBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert6:*:*:lts:*:*:*", "matchCriteriaId": "B95DE43E-F864-4A8E-8D49-3E2D7CFE6BFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert7:*:*:lts:*:*:*", "matchCriteriaId": "CE887232-A798-4179-B870-01B26685D8BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert8:*:*:lts:*:*:*", "matchCriteriaId": "7D19CBBB-8ED0-45B9-8977-6CCCA82DFF1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert9:*:*:lts:*:*:*", "matchCriteriaId": "79E404AC-A27E-49AE-891D-CA9C7164D8D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.21:cert1:*:*:lts:*:*:*", "matchCriteriaId": "BA930626-B4BA-4A2D-AF55-B4F0E94B1BB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.21:cert2:*:*:lts:*:*:*", "matchCriteriaId": "85583966-C42B-4A27-B19D-B3E1C956A5A3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a stack consumption vulnerability in the res_http_websocket.so module of Asterisk through 13.23.0, 14.7.x through 14.7.7, and 15.x through 15.6.0 and Certified Asterisk through 13.21-cert2. It allows an attacker to crash Asterisk via a specially crafted HTTP request to upgrade the connection to a websocket." }, { "lang": "es", "value": "Hay una vulnerabilidad de consumo de pila en el m\u00f3dulo res_http_websocket.so de Asterisk hasta la versi\u00f3n 13.23.0; versiones 14.7.x anteriores a la 14.7.7 y las versiones 15.x anteriores a la 15.6.0, as\u00ed como Certified Asterisk hasta la versi\u00f3n 13.21-cert2. Permite que un atacante provoque el cierre inesperado de Asterisk mediante una petici\u00f3n HTTP para actualizar la conexi\u00f3n a un websocket." } ], "id": "CVE-2018-17281", "lastModified": "2024-11-21T03:54:10.270", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-24T22:29:01.580", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2018-009.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/149453/Asterisk-Project-Security-Advisory-AST-2018-009.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2018/Sep/31" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105389" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041694" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-28013" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00034.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2018/Sep/53" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201811-11" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4320" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2018-009.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/149453/Asterisk-Project-Security-Advisory-AST-2018-009.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2018/Sep/31" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105389" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041694" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-28013" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2018/Sep/53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201811-11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4320" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-12-13 20:29
Modified
2025-04-20 01:37
Severity ?
Summary
A Remote Crash issue was discovered in Asterisk Open Source 13.x before 13.18.4, 14.x before 14.7.4, and 15.x before 15.1.4 and Certified Asterisk before 13.13-cert9. Certain compound RTCP packets cause a crash in the RTCP Stack.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digium | asterisk | * | |
digium | asterisk | * | |
digium | asterisk | * | |
digium | certified_asterisk | * | |
digium | certified_asterisk | 13.13 | |
digium | certified_asterisk | 13.13 | |
digium | certified_asterisk | 13.13 | |
digium | certified_asterisk | 13.13 | |
digium | certified_asterisk | 13.13 | |
digium | certified_asterisk | 13.13 | |
digium | certified_asterisk | 13.13 | |
digium | certified_asterisk | 13.13 | |
digium | certified_asterisk | 13.13 | |
digium | certified_asterisk | 13.13 | |
digium | certified_asterisk | 13.13 | |
digium | certified_asterisk | 13.13 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "86CE0074-C728-4A0C-AF7B-E5F095C7AD9E", "versionEndExcluding": "13.18.4", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A023AEF-773E-4DD8-B860-5B1D4E061F85", "versionEndExcluding": "14.7.4", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "8300EA07-CDDD-49C2-8F73-BBE6749000CB", "versionEndExcluding": "15.1.4", "versionStartIncluding": "15.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:certified_asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF0E7AD0-0B51-47BC-8746-CAC7C63F8AE8", "versionEndIncluding": "13.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert1:*:*:*:*:*:*", "matchCriteriaId": "0449B393-FA4E-4664-8E16-BE6B94E4872F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc1:*:*:*:*:*:*", "matchCriteriaId": "2ED8E415-64FA-4E77-A423-3478E606E58E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc2:*:*:*:*:*:*", "matchCriteriaId": "E13CA1DD-B384-4408-B4EC-1AA829981016", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc3:*:*:*:*:*:*", "matchCriteriaId": "EE28BD0A-EA30-4265-A5D6-0390F3558D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc4:*:*:*:*:*:*", "matchCriteriaId": "0F82048D-C65F-4439-BBE4-2D4A9B07EB7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert2:*:*:*:*:*:*", "matchCriteriaId": "6447B77F-3770-4703-9188-B7344ED98E94", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert3:*:*:*:*:*:*", "matchCriteriaId": "5C103924-1D61-4090-8ED5-4731371B2B2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert4:*:*:*:*:*:*", "matchCriteriaId": "08F87B09-3867-4CAE-BAD7-2206CD6CAF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert5:*:*:*:*:*:*", "matchCriteriaId": "0D12B31E-C30C-442A-9BD8-504CF7EB1321", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert6:*:*:*:*:*:*", "matchCriteriaId": "B43DA484-83DC-4489-9037-B85B845078E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert7:*:*:*:*:*:*", "matchCriteriaId": "D8740005-0BCF-4B76-A600-25A9BF0F3C42", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert8:*:*:*:*:*:*", "matchCriteriaId": "4298EEE5-3F0E-4227-ACF8-CEE18868055F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Remote Crash issue was discovered in Asterisk Open Source 13.x before 13.18.4, 14.x before 14.7.4, and 15.x before 15.1.4 and Certified Asterisk before 13.13-cert9. Certain compound RTCP packets cause a crash in the RTCP Stack." }, { "lang": "es", "value": "Se ha descubierto un problema de cierre inesperado remoto en Asterisk Open Source en versiones 13.x anteriores a la 13.18.4; versiones 14.x anteriores a la 14.7.4 y las versiones 15.x anteriores a la 15.1.4, as\u00ed como Certified Asterisk en versiones anteriores a la 13.13-cert9. Ciertos paquetes compuestos RTCP pueden provocar un cierre inesperado en la pila RTCP." } ], "id": "CVE-2017-17664", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-12-13T20:29:00.253", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.digium.com/pub/security/AST-2017-012.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102201" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040009" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27382" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27429" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2017/dsa-4076" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.digium.com/pub/security/AST-2017-012.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102201" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040009" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27382" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27429" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2017/dsa-4076" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-31 14:55
Modified
2025-04-11 00:51
Severity ?
Summary
channels/chan_iax2.c in Asterisk Open Source 1.8.x before 1.8.15.1 and 10.x before 10.7.1, Certified Asterisk 1.8.11 before 1.8.11-cert7, Asterisk Digiumphones 10.x.x-digiumphones before 10.7.1-digiumphones, and Asterisk Business Edition C.3.x before C.3.7.6 does not enforce ACL rules during certain uses of peer credentials, which allows remote authenticated users to bypass intended outbound-call restrictions by leveraging the availability of these credentials.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6344E43-E8AA-4340-B3A7-72F5D6A5D184", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "4C170C1C-909D-4439-91B5-DB1A9CD150C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EE821BE5-B1D3-4854-A700-3A83E5F15724", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "149C57CA-0B4B-4220-87FC-432418D1C393", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "035595D5-BBEC-4D85-AD7A-A2C932D2BA70", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "6DAF5655-F09F-47F8-AFA6-4B95F77A57F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F8E001D8-0A7B-4FDD-88E3-E124ED32B81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9D5CFFBD-785F-4417-A54A-F3565FD6E736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "D30EF999-92D1-4B19-8E32-1E4B35DE4EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "A67D156B-9C43-444F-ADEC-B21D99D1433C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "893EB152-6444-43DB-8714-9735354C873A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8447EE7-A834-41D7-9204-07BD3752870C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C04F2C9-5672-42F2-B664-A3EE4C954C29", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "33465668-4C91-4619-960A-D26D77853E53", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "CAD08674-0B44-44EA-940B-6812E2D5077D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "EEE87710-A129-43AA-BA08-8001848975FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F582C6E-5DA0-4D72-A40E-66BDBC5CF2B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CEBB8-01B3-4A05-AFE8-37A143C9833E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "522733A7-E89E-4BFD-AC93-D6882636E880", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "2FAC47DD-B613-43E4-B9BF-6120B81D9789", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "86D20CB5-60E8-405E-B387-CF80C7DA5E07", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "71AB5A01-5961-4053-9111-CF32C6473A00", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*", "matchCriteriaId": "77D8E1DC-041F-4B87-AF9A-E0EC4D6A4BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7CCCB892-30CE-4BEF-904E-5D957F94D0EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "F156798F-F2EF-4366-B17E-03165AB437D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "9EFBB9A6-DD1D-436E-919F-74A3E4F40396", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "054E34C8-B6A5-48C7-938E-D3C268E0E8BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*", "matchCriteriaId": "1DCECA72-533A-4A95-AB19-20C5F09A1B01", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*", "matchCriteriaId": "0E2309F8-AFEE-4150-99D1-BA606432ED73", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*", "matchCriteriaId": "7785F282-BFA0-400A-8398-872ACCA4BF37", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1278D3FB-78C6-4F7D-A845-0A93D4F6E2B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "C00A6EFB-A848-46D3-AAD7-FD8140007E42", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "CB6E3972-5C53-4B6D-BFE1-67E1122EA013", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "048617A0-A783-4519-A947-35220D4CD786", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "DD493A41-E686-444C-A34E-412804510F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "87D25FD6-CC3A-4AB0-B7B1-67D07386F99D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C402E9E-09CC-4EFA-AC27-156437B05B22", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C8A41F9C-D2F4-47A9-80CD-2B1BF6B0CB63", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "627FF5B9-E5A8-4DBC-A891-B175011E72A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6146EB2E-BA32-4408-B10B-A711EC39C580", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "1C863324-05AE-4FCA-BD2E-39040A468DCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A85F51E7-0AAE-4F3B-9F90-BD2E31255822", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "315FB0D4-D4A4-4369-BFB8-F2CAEB429015", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "DC74D6C5-F410-4B68-AF92-056B727193A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "B70911F8-A526-4600-8198-03FF4CCB28DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA60A9C9-C2EF-4971-BEFB-FF687DAEF2F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "BAFB22FA-CC24-4AFE-AC83-2D044563F7CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "00F3EB0D-7C63-46B5-BA95-8486B9716C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "00C1BF3B-7593-478D-9AAA-153901C70286", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "82423EC2-FA29-4AF6-86C3-6AC6DFDC4DC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "5F86406A-0936-4A06-88FB-4137A64498EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "672CE4C0-EBD6-470B-937E-810FF1C4CDBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "88DB1105-74D8-4312-9D02-D1E21F2E785C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "404C0557-6229-4D90-BFDD-54AFFCCE6A19", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6D1D26CC-891F-4396-B7D7-30D712829E71", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F25B61EA-F4D1-452A-9D96-B8DFDD719B0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9324AB96-EC99-4F04-A0A9-00F936C86EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "1B8B5E76-4A74-4E88-8A6F-C23538B7642A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "BDB6BBCA-47CE-49B8-9706-AFDE4BE46550", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "8BFF65E2-692B-4C39-88FC-6DED8D9A7258", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "5260E309-9320-4DB8-A918-7D215BF95D2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "60AFF340-A866-4CFE-9334-53B95FD4AA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "74E50309-CD7D-41F7-97DA-A7E451D0796A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "6FD3F8F8-820E-4C29-9F8F-023D1DB999CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "C33A6419-0D00-49D6-9A48-2B633610AAED", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "447E07C9-4A25-418D-B53F-609B78EE4C21", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E8AE686-B618-4B0D-BD27-1F96295E964D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E9751C0A-84F5-4A43-8282-12A9DE559569", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F67E2694-F6F1-482C-91F2-D9FD856EA31B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "5E2D53AA-8D50-445F-9500-2F580F260DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12:*:*:*:*:*:*:*", "matchCriteriaId": "8D9D7D88-D64F-4F54-8C84-6AC45FBD36F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "F67AB282-591C-4ED7-9750-C593A38D5D7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "C9F8F881-2BF7-44AB-8756-54A06801EB11", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "36EFF3C4-4D00-4BC5-94B9-403BB00C6AB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "5E434F10-395E-426E-A988-4CDA504577D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "8880AE7C-3E44-4B76-B500-E93868D4CF5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7C94269D-A271-42AC-A44C-102C814E564B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E7E5B826-D3D5-4D2D-BB4D-2C1BEDE92456", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "5BA564F7-7A69-4805-8C8C-C2EB5E12A6E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "DF6FA464-F9D3-4674-844B-A2B2E2C42A51", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "44722C8B-BB37-4444-A58A-F01D0B3B4DDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "C4FABFDB-D99A-4F83-8FEE-3BFA36BA4061", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "A842E112-8974-4E74-AD56-1DEF5B5DD9F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.15.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D9ACBC01-8A9D-43A5-A825-1CC9670417A6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "687ED3CE-67C4-410D-8AF4-C769015598F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "30E918CD-89C4-42DA-9709-E50E0A3FA736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "DA57FA15-D0D7-4A97-9C25-6F6566940098", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "A1C45300-A2CF-40E7-AB67-23DC24C31A1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "958081DC-1D77-45CD-A940-C7A1AB42C7BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "298A879D-4F65-4523-A752-D17C4F81B822", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "37AB07BE-54C4-4972-A05F-D1E2CF4363CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBC63564-A84E-463D-8312-DDF1C6B7796F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "62A0906E-B631-4F3A-9ABC-9A43A43220BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "C6314ADA-2849-416D-966E-C01C322EF904", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "8B6CB1DD-614A-4B3D-99AE-9B1341427024", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "CC95B04F-3746-4F1C-8428-A1FA10253E14", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "20819080-E0AB-4879-B4CF-A154D6F7EF6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C6C45753-E2CC-4F7C-B8DA-3D8CF255EA22", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5A080197-D6AA-4FDC-888E-51D1C8251E34", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "1F08D930-D4C1-4C63-875C-171C46AE97C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "1AA43D7D-AEAD-47CB-BFA5-B73004A1A7A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "B5ED5F6F-166D-4610-8939-A33AD45F1ADE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D40002A-564E-425C-BA2A-7C4A8F8DAFD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "521C4DB2-7127-4BA9-94FC-AB0E9E06FE2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "8C905DC1-8AB8-4D83-BB5B-FA4DABC58229", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "ECC74B5D-97A1-46FF-AFA3-5D5E4A0BF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "F2D98C7C-94A8-4348-AF22-04A41FB6F8EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "85D39A99-E9A6-4860-BC61-56CA2FC3238B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "845DA0A4-1983-4E82-99C8-B7FBF47C632E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "5A63FBB7-F1CF-4603-848F-980742D2ED36", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "10B2084F-3AF4-4008-899C-6C1E43715201", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "217C13A5-9F8A-4392-858F-2FC88B03EB0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "6B282462-900C-492E-98DE-65364E62F5E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "687784F0-9ACC-435D-81F9-1E1B0F61010C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "9D7D020C-FE32-408B-BE37-58835FD3D95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "39B7938F-7370-4F67-B0CD-1C14DE2E4E7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC587195-5973-423B-8BF9-3E0B27363B76", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "1FBE5780-D503-46D1-BE04-4CB7B662B5DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CB19323D-208F-45F9-85F3-BAA5D1BC3AA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "09334CAB-9ADB-49BB-BE83-BBAC6A7A9F47", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "DC6DEEF5-7277-4E38-9233-E3612CD77CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "75A0D613-3D04-4902-9707-E743F30CF1A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "54AB61A7-E143-4BEC-8658-68FF615B007E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert:*:*:*:*:*:*", "matchCriteriaId": "C63C46CC-02E2-40AF-8281-F2FB5D89823A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert1:*:*:*:*:*:*", "matchCriteriaId": "71BAF2A7-024D-475A-88C0-0F5ADE3CA286", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert2:*:*:*:*:*:*", "matchCriteriaId": "82F91FE8-C320-466B-AF08-67319A00A2BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert3:*:*:*:*:*:*", "matchCriteriaId": "DCFF0E1C-B455-4C18-8AA1-10408234327B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert4:*:*:*:*:*:*", "matchCriteriaId": "738F68B3-2C5E-4A09-8FF4-2D034ED0C54D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert5:*:*:*:*:*:*", "matchCriteriaId": "6A60C223-AD68-4BFF-91C1-2C7E9F727AA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert6:*:*:*:*:*:*", "matchCriteriaId": "4C313F81-8B38-4845-B1C7-CBB23D7C99B6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:10.5.2:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "E65E012A-49B6-4796-B1FA-A83C9248D0EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.6.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "9F4C24B7-22E3-4E56-9B9F-414101B627FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.6.1:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "1813B898-F957-40D7-AF9A-064FB57D5C82", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.7.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "C5D07DB0-7C6A-4490-8FD0-DC83568E0421", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:c.3.0:-:business:*:*:*:*:*", "matchCriteriaId": "78E8936C-033B-49E6-BB39-D5BBBC80EB55", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.1.0:-:business:*:*:*:*:*", "matchCriteriaId": "5D05D04F-CD6C-4A73-885C-306D7A5CC7C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.1.1:-:business:*:*:*:*:*", "matchCriteriaId": "3805B5F3-A4CD-469F-9F8A-A271A79A2B7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.2.2:-:business:*:*:*:*:*", "matchCriteriaId": "9FAEBE5E-378A-40DC-B2B9-31F6D1305BCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.2.3:-:business:*:*:*:*:*", "matchCriteriaId": "617B3FE8-39E3-41C0-9348-9507DA43DE93", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.3.2:-:business:*:*:*:*:*", "matchCriteriaId": "04AB4C82-71BB-49B7-B4F3-4E75EFB5F1A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.6.2:-:business:*:*:*:*:*", "matchCriteriaId": "78B55176-E269-411B-974A-B5D2CE8E08C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.6.3:-:business:*:*:*:*:*", "matchCriteriaId": "9BCF12B0-4B8D-499D-B5DE-FB0CD9EEC3B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.6.4:-:business:*:*:*:*:*", "matchCriteriaId": "9ED68059-F0E5-4B1B-B633-466D92F38346", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.7.5:-:business:*:*:*:*:*", "matchCriteriaId": "BFE16F42-025D-4C9D-AD4A-08FDEF957F09", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "channels/chan_iax2.c in Asterisk Open Source 1.8.x before 1.8.15.1 and 10.x before 10.7.1, Certified Asterisk 1.8.11 before 1.8.11-cert7, Asterisk Digiumphones 10.x.x-digiumphones before 10.7.1-digiumphones, and Asterisk Business Edition C.3.x before C.3.7.6 does not enforce ACL rules during certain uses of peer credentials, which allows remote authenticated users to bypass intended outbound-call restrictions by leveraging the availability of these credentials." }, { "lang": "es", "value": "channels/chan_iax2.c en Asterisk Open Source v1.8.x antes de v1.8.15.1 y v10.x antes de v10.7.1, Certified Asterisk v1.8.11-1.8.11 antes de cert7, Digiumphones Asterisk v10.xx-digiumphones antes de v10.7.1-digiumphones y Asterisk Business Edition C.3.x antes de C.3.7.6 no hace cumplir las reglas de ACL durante ciertos usos del par de credenciales, lo que permite a usuarios remotos autenticados eludir las restricciones de llamadas de salida aprovech\u00e1ndose de la disponibilidad de estas credenciales.\r\n" } ], "id": "CVE-2012-4737", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-31T14:55:01.387", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2012-013.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/50687" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/50756" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2012/dsa-2550" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/55335" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1027461" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2012-013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/50687" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/50756" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2550" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/55335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1027461" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-04-27 00:55
Modified
2025-04-11 00:51
Severity ?
Summary
Asterisk Open Source 1.4.x before 1.4.40.1, 1.6.1.x before 1.6.1.25, 1.6.2.x before 1.6.2.17.3, and 1.8.x before 1.8.3.3 and Asterisk Business Edition C.x.x before C.3.6.4 do not restrict the number of unauthenticated sessions to certain interfaces, which allows remote attackers to cause a denial of service (file descriptor exhaustion and disk space exhaustion) via a series of TCP connections.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E56DB29-571D-4615-B347-38CF4590E463", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "FC1188DA-6C27-48D2-9CE7-74D77B24EE9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "A93B8F91-5C56-44DE-AE29-8468E853759F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "BF7F4D02-7C8E-403C-A53E-A5F8C07F33A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "D85031A3-3444-4650-905D-721F1EBAA24F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "6F0AC2B3-6E8A-4B26-8A6C-792D9E5072C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "2BC8D6D4-A389-4A78-8DA8-351A9CB896E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "5E979AC4-58EA-4297-9F90-350924BBE440", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "D9154EDB-CAE6-4BB0-8D02-9EC2B81D93C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "A432B0A7-F158-4B9C-97F6-6A29DB13EAFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "687C67CB-46AF-40C2-8A02-081C7F78568A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "6E8D6EC0-A61E-4DBC-A0C7-864E9C4BDA1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EF7F65A-45FD-4586-901E-49B057100BB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "300F158E-ED27-46C8-85E4-AA0AA6B201DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "FB6F04C0-3226-4D2C-97A3-39999483C62C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "30685A20-963A-48D4-B7D7-2C11C2C812AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "C54C3AAC-4D5D-4661-86AB-6849982E8C67", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "6F847916-89F1-4AA6-973D-6002C8B54EE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "5359815E-671A-4DFD-9E99-8CF903A03C84", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "E2EFBC9E-4DCA-43CB-93EB-6807E2383A98", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.18:*:*:*:*:*:*:*", "matchCriteriaId": "98755B1B-CAD5-4AC5-8571-52E67C3A8274", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:*:*:*:*:*:*:*", "matchCriteriaId": "C9D8C8FE-3D09-4F60-AD03-9D4439942141", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc1:*:*:*:*:*:*", "matchCriteriaId": "902FBE4B-5237-43CD-8EB6-D2CAC0F30879", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc2:*:*:*:*:*:*", "matchCriteriaId": "708DCACA-49EC-468D-81EC-CE5367F8A164", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc3:*:*:*:*:*:*", "matchCriteriaId": "BA9E3314-7D23-414C-8187-16D807410B62", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc4:*:*:*:*:*:*", "matchCriteriaId": "D824ED7B-BAB6-4C0F-A6B0-A75AB072EC0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A01CE63-F834-48B2-826D-2DAD1B4AE8C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "88B9CC9D-3DC2-4674-BA52-4C6D4E2056C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:*:*:*:*:*:*:*", "matchCriteriaId": "43F1849F-1230-45E7-B6A3-D6FC72EB0F11", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc1:*:*:*:*:*:*", "matchCriteriaId": "873C9C7E-93A3-4269-B19C-AB33A21C1AC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc2:*:*:*:*:*:*", "matchCriteriaId": "457F2112-7C5E-4953-8F4C-117925D486DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc3:*:*:*:*:*:*", "matchCriteriaId": "BD15ADD6-D7FA-441A-A9BC-487BCC15F2A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "792A8901-B7B8-40E8-9258-6338B72770FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:*:*:*:*:*:*:*", "matchCriteriaId": "0E6C8F78-0C00-45A5-8FEB-2A4BD5AC1A37", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:rc1:*:*:*:*:*:*", "matchCriteriaId": "F3E04247-C4EF-4C1B-B879-5C02986950D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:rc2:*:*:*:*:*:*", "matchCriteriaId": "5E382FC8-4001-4058-9151-05AE98B4A35E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "11FECE6B-B6A6-4DDA-9019-9A10B05EC1F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "D9813D27-0688-4989-99EB-1DC0F82D59F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:*:*:*:*:*:*:*", "matchCriteriaId": "D4333904-9D21-4149-965F-F49F0A34BD85", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc1:*:*:*:*:*:*", "matchCriteriaId": "F7180626-F0FD-46F3-AD52-5C67525C4B46", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc2:*:*:*:*:*:*", "matchCriteriaId": "85A1E3A3-C157-4F3D-9477-F63771E7F627", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc3:*:*:*:*:*:*", "matchCriteriaId": "FEE739CC-7A9C-489E-BFC0-6257129C043D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc4:*:*:*:*:*:*", "matchCriteriaId": "ADC0E947-A95A-44ED-8DED-CC769FF00569", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc5:*:*:*:*:*:*", "matchCriteriaId": "DE52BD9F-3728-455C-BC45-1A4DB926FFE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22.1:*:*:*:*:*:*:*", "matchCriteriaId": "1EF82D41-9222-42D3-ADAD-94B4F950C63F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AE9F181-A8E4-4700-A30F-211CDE251606", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:*:*:*:*:*:*:*", "matchCriteriaId": "5B10AE4B-EC2D-4D5B-B842-50F5097A0650", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc1:*:*:*:*:*:*", "matchCriteriaId": "83E854D0-17A2-473B-B7E8-41E6447C81DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc2:*:*:*:*:*:*", "matchCriteriaId": "47169133-3854-4D8F-B79E-3CC77A166EF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc3:*:*:*:*:*:*", "matchCriteriaId": "6071601F-CF37-4E66-9D6D-AFC3434C18AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc4:*:*:*:*:*:*", "matchCriteriaId": "2A575824-E005-4820-824A-4875594619E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "080C7089-5662-4A94-9842-C4A26095DA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23.2:*:*:*:*:*:*:*", "matchCriteriaId": "7AE38697-0B16-4032-9234-CA263E4A9885", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.24:*:*:*:*:*:*:*", "matchCriteriaId": "DCB18BE2-B073-429C-ABE7-B8305793DAE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.24:rc1:*:*:*:*:*:*", "matchCriteriaId": "FA7216BA-A42F-4ED8-8086-B4FA483FDAB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "CB7D2048-CD61-46C0-830B-11976B275783", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.25:*:*:*:*:*:*:*", "matchCriteriaId": "8DBA63FE-62AF-4F3D-B30C-550D17C4E35F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.25:rc1:*:*:*:*:*:*", "matchCriteriaId": "AD0A0F19-020D-4578-9023-12B0CB646D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.25.1:*:*:*:*:*:*:*", "matchCriteriaId": "96D5A1E3-FF0B-4C71-AA51-655D7106880D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:*:*:*:*:*:*:*", "matchCriteriaId": "E5D425E6-E2E5-4452-9EAA-2697C1155784", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc1:*:*:*:*:*:*", "matchCriteriaId": "9855FA26-0930-4AC9-A920-B394F6916349", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc2:*:*:*:*:*:*", "matchCriteriaId": "BBA21246-7DF4-41BC-998A-05D38FC97C8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc3:*:*:*:*:*:*", "matchCriteriaId": "EE9A7984-22C9-4296-8E44-C010E67F193D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc4:*:*:*:*:*:*", "matchCriteriaId": "51B2C42A-C252-4BD8-A908-8F30C2BF15E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc5:*:*:*:*:*:*", "matchCriteriaId": "2137CEAD-0F19-43C5-A26D-1972564FCD8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc6:*:*:*:*:*:*", "matchCriteriaId": "B7552466-B782-4F16-8561-A2A51E94FED4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26.1:*:*:*:*:*:*:*", "matchCriteriaId": "C2F8C82D-3031-4C62-89FA-3BF56EA29727", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26.2:*:*:*:*:*:*:*", "matchCriteriaId": "B3074CEA-46BD-4CAD-BF5C-10008A80E434", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6AB8988-FCC6-407A-A7D9-2F7A3A7488B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E06848DE-6EE1-4FD0-A14F-39D41B2F3E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc1:*:*:*:*:*:*", "matchCriteriaId": "CF342950-FDD7-41A9-94D5-EDF41130B61E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc2:*:*:*:*:*:*", "matchCriteriaId": "6E4543AA-3D54-4444-AD1F-381A87A89DA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc3:*:*:*:*:*:*", "matchCriteriaId": "AF3036DD-261C-4975-A01E-92CD29479588", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc4:*:*:*:*:*:*", "matchCriteriaId": "EF07C116-27DC-4875-9DCF-049E2A8EAEA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc5:*:*:*:*:*:*", "matchCriteriaId": "88FBC328-538A-4484-A342-1688D9669B9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27.1:*:*:*:*:*:*:*", "matchCriteriaId": "CBF2301E-F6EF-4D28-82EE-FA1AB8CA9E43", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.28:*:*:*:*:*:*:*", "matchCriteriaId": "A53F637C-846A-43FC-BA71-C8571648FA46", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.28:rc1:*:*:*:*:*:*", "matchCriteriaId": "E61070F4-1B6B-4814-918E-459DE5119A24", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.29:*:*:*:*:*:*:*", "matchCriteriaId": "70664E0F-09CF-42C2-A7A7-E635D022E90D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.29:rc1:*:*:*:*:*:*", "matchCriteriaId": "D1E13E1A-C2D4-4E5A-84C8-E6AF061D67C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.29.1:*:*:*:*:*:*:*", "matchCriteriaId": "7E811134-B657-4C50-9AEF-A7F68CA5577A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.30:*:*:*:*:*:*:*", "matchCriteriaId": "4C4CD101-F079-4940-AA79-886B69A7A514", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.30:rc2:*:*:*:*:*:*", "matchCriteriaId": "B7B828E9-5BE3-4E6F-8048-F2B1F2E929CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.30:rc3:*:*:*:*:*:*", "matchCriteriaId": "75BB2066-74A6-4F89-B54C-35F234DC1F03", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.31:*:*:*:*:*:*:*", "matchCriteriaId": "FE522334-BF53-4E34-949B-CD928B59A341", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.31:rc1:*:*:*:*:*:*", "matchCriteriaId": "648DEC0E-3CBC-4EA2-AF27-2C518B0762CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.31:rc2:*:*:*:*:*:*", "matchCriteriaId": "B50F4BAE-D00D-4352-B52B-BE1A9FFB6949", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.32:*:*:*:*:*:*:*", "matchCriteriaId": "E7A35508-8235-4915-8810-12B2630C82C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.32:rc1:*:*:*:*:*:*", "matchCriteriaId": "63DD4EE5-6F56-41C7-9CB4-16ADF4F63B8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.33:*:*:*:*:*:*:*", "matchCriteriaId": "2347E451-2F89-4EA6-A6E0-22BCB0C8A56E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.33:rc1:*:*:*:*:*:*", "matchCriteriaId": "A86F5360-6FE4-4EA2-9208-076E78C842A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.33:rc2:*:*:*:*:*:*", "matchCriteriaId": "3CDFA85B-17A4-4ECC-9922-F5546917B4C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.33.1:*:*:*:*:*:*:*", "matchCriteriaId": "3D7D7DB7-32A7-490E-AED2-C404D371E7C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.34:*:*:*:*:*:*:*", "matchCriteriaId": "A03632BC-CA0F-42BD-8839-A72DB146A4A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.34:rc1:*:*:*:*:*:*", "matchCriteriaId": "9DC4EF64-6A1D-47CB-AC07-48CABB612DCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.34:rc2:*:*:*:*:*:*", "matchCriteriaId": "68C00FEF-7850-48F4-8122-4211D080B508", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.35:*:*:*:*:*:*:*", "matchCriteriaId": "D3A48F07-42E1-47E9-94EA-44D20A0BAC3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.35:rc1:*:*:*:*:*:*", "matchCriteriaId": "87D16470-5892-4289-BB35-B69100BCA31E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.36:*:*:*:*:*:*:*", "matchCriteriaId": "15E71BD7-83D1-4E2B-AD40-BB6B53056C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.36:rc1:*:*:*:*:*:*", "matchCriteriaId": "87FDE2E2-5F08-43EF-BBD8-7DCCC0C98870", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.37:*:*:*:*:*:*:*", "matchCriteriaId": "347E9D8C-A372-41F2-AB48-FFCAB454C9C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.37:rc1:*:*:*:*:*:*", "matchCriteriaId": "74F67E57-1DD0-4850-8D7E-7A9748BD106C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.38:*:*:*:*:*:*:*", "matchCriteriaId": "B208C056-B567-4BEE-A9B7-AEB394341D5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.38:rc1:*:*:*:*:*:*", "matchCriteriaId": "A0C3A2D4-07A9-4D28-AC18-03523E9FF34A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.39:*:*:*:*:*:*:*", "matchCriteriaId": "E6516E0F-9F60-4D20-88D3-B9CD8DC93062", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.39:rc1:*:*:*:*:*:*", "matchCriteriaId": "22147B91-45A4-4834-AC8D-2DC17A706BEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.39.1:*:*:*:*:*:*:*", "matchCriteriaId": "677C10DE-46D8-4EF1-BF22-63F3AE37CBC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.39.2:*:*:*:*:*:*:*", "matchCriteriaId": "E299CE20-B02D-4519-AC46-BB64B1E3826A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.40:*:*:*:*:*:*:*", "matchCriteriaId": "22FD16C3-7518-4208-8C0A-043C13C14A72", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.40:rc1:*:*:*:*:*:*", "matchCriteriaId": "2461B6B9-2C93-4D84-A1EE-C07AD32A9540", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.40:rc2:*:*:*:*:*:*", "matchCriteriaId": "C8A4CE2D-FBAB-4C35-846A-5B95BBCAD6BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.40:rc3:*:*:*:*:*:*", "matchCriteriaId": "30FFB6F4-1BC7-4D4C-9C65-A66CF514E321", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1F8B700A-FACB-4BC8-9DF2-972DC63D852B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FFD31B9B-2F43-4637-BE56-47A807384BF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "E6450D6B-C907-49E6-9788-E4029C09285F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "DDB0432E-024A-4C0C-87FF-448E513D2834", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "D6A6A343-FEA2-49E5-9858-455AE3B29470", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc6:*:*:*:*:*:*", "matchCriteriaId": "D57B94E3-EA37-466C-ADC4-5180D4502FDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc7:*:*:*:*:*:*", "matchCriteriaId": "64D35A89-6B21-4770-AA0F-424C5C91A254", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc8:*:*:*:*:*:*", "matchCriteriaId": "14817302-A34A-4980-B148-AEB4B3B49BE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "61FDFA96-E62A-413B-9846-F51F1F7349EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "DA924386-49F6-4371-B975-B1473EEA12F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "B74A1B99-8901-4690-B994-1DAD3EFA5ABB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "4253C7DD-3588-4B35-B96D-C027133BE93F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "24AE11DB-16D3-42BF-BC64-E8982107D35B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "53841D77-926C-4362-BC85-BD8B6AC4391D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "F98FD6E6-EDE9-437D-B7C2-2DB65B73D230", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "4BA6CA77-D358-4623-8400-78EFC47ADB7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "B4E62DAB-45E0-4EAA-8E45-6D3757A679D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.15:rc1:*:*:*:*:*:*", "matchCriteriaId": "1355578C-B384-401A-9123-2789CBECAD0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "3491F8DB-A162-4608-B5F9-5401FE058CEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16:rc1:*:*:*:*:*:*", "matchCriteriaId": "C52730A8-D96E-46C1-8905-1D78A93E9C84", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "C6E5CD17-B14A-4BDB-BA75-261344FF6F25", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "63C8DBF5-6992-4618-BD2D-56F1F98EAE3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "EEED6C07-CFB7-44DC-9A41-9B6271942123", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:rc1:*:*:*:*:*:*", "matchCriteriaId": "0864DAF9-B7FA-4018-99F4-F2A7AA6FBBB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:rc2:*:*:*:*:*:*", "matchCriteriaId": "694B257B-E73B-4534-B316-87284FA45534", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:rc3:*:*:*:*:*:*", "matchCriteriaId": "418FD91F-014E-4529-8D72-D3FB27788EEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "D213EC93-0D4F-4BD9-9F13-9A9E705135EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17.2:*:*:*:*:*:*:*", "matchCriteriaId": "2E9D2091-B292-4D6E-A91F-58D24BD5A5E3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6344E43-E8AA-4340-B3A7-72F5D6A5D184", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "4C170C1C-909D-4439-91B5-DB1A9CD150C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EE821BE5-B1D3-4854-A700-3A83E5F15724", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "149C57CA-0B4B-4220-87FC-432418D1C393", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "035595D5-BBEC-4D85-AD7A-A2C932D2BA70", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "6DAF5655-F09F-47F8-AFA6-4B95F77A57F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F8E001D8-0A7B-4FDD-88E3-E124ED32B81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9D5CFFBD-785F-4417-A54A-F3565FD6E736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "D30EF999-92D1-4B19-8E32-1E4B35DE4EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "A67D156B-9C43-444F-ADEC-B21D99D1433C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "893EB152-6444-43DB-8714-9735354C873A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8447EE7-A834-41D7-9204-07BD3752870C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C04F2C9-5672-42F2-B664-A3EE4C954C29", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "33465668-4C91-4619-960A-D26D77853E53", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "CAD08674-0B44-44EA-940B-6812E2D5077D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "EEE87710-A129-43AA-BA08-8001848975FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F582C6E-5DA0-4D72-A40E-66BDBC5CF2B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CEBB8-01B3-4A05-AFE8-37A143C9833E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "522733A7-E89E-4BFD-AC93-D6882636E880", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "2FAC47DD-B613-43E4-B9BF-6120B81D9789", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "86D20CB5-60E8-405E-B387-CF80C7DA5E07", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "71AB5A01-5961-4053-9111-CF32C6473A00", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*", "matchCriteriaId": "77D8E1DC-041F-4B87-AF9A-E0EC4D6A4BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7CCCB892-30CE-4BEF-904E-5D957F94D0EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "F156798F-F2EF-4366-B17E-03165AB437D5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:c.1.0:beta7:business:*:*:*:*:*", "matchCriteriaId": "1C4E15BB-71AB-4936-9CA7-E844572A3953", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.0:beta8:business:*:*:*:*:*", "matchCriteriaId": "EE5823E1-5BFF-44E0-B8DD-4D994073DC1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.6:-:business:*:*:*:*:*", "matchCriteriaId": "E6C147EF-0C39-4979-A4F6-C0BE288F083F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.6.1:-:business:*:*:*:*:*", "matchCriteriaId": "0C1A8352-DE70-4D4E-BC4D-8EABE5431646", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.6.2:-:business:*:*:*:*:*", "matchCriteriaId": "615D7356-E9DD-4149-B1BE-D3C3475A8841", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.8.0:-:business:*:*:*:*:*", "matchCriteriaId": "0628E34F-1A60-416D-A29C-EA28E8CC2430", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.8.1:-:business:*:*:*:*:*", "matchCriteriaId": "5F54511A-A2A9-4038-9D7D-2283A6709DB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.2.3:-:business:*:*:*:*:*", "matchCriteriaId": "3FA908BA-BEF8-44A5-AC95-E7CF020D0C94", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.0:-:business:*:*:*:*:*", "matchCriteriaId": "78E8936C-033B-49E6-BB39-D5BBBC80EB55", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.1.0:-:business:*:*:*:*:*", "matchCriteriaId": "5D05D04F-CD6C-4A73-885C-306D7A5CC7C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.1.1:-:business:*:*:*:*:*", "matchCriteriaId": "3805B5F3-A4CD-469F-9F8A-A271A79A2B7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.2.2:-:business:*:*:*:*:*", "matchCriteriaId": "9FAEBE5E-378A-40DC-B2B9-31F6D1305BCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.2.3:-:business:*:*:*:*:*", "matchCriteriaId": "617B3FE8-39E3-41C0-9348-9507DA43DE93", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.3.2:-:business:*:*:*:*:*", "matchCriteriaId": "04AB4C82-71BB-49B7-B4F3-4E75EFB5F1A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.6.2:-:business:*:*:*:*:*", "matchCriteriaId": "78B55176-E269-411B-974A-B5D2CE8E08C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.6.3:-:business:*:*:*:*:*", "matchCriteriaId": "9BCF12B0-4B8D-499D-B5DE-FB0CD9EEC3B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B8FE4BCF-9AE7-4F41-BA84-E9537CC1EBE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F25B0D15-7C09-4BBB-AC84-A1898F448DB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F259057F-3720-45D8-91B4-70A11B759794", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "A106C460-4CE2-4AC3-B2FD-310F05507511", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "3E119FF9-2AD3-450D-8BBF-C6DD063246EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "759221D5-FC37-446D-9628-233B8D0B9120", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F82D4812-0429-42D4-BD27-C76CB9E7C368", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8FE11D6-8C0A-450E-B6DA-3AFE04D82232", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "5D1FBCC8-4637-4A67-BFFD-C052C3C03C12", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "F7307E10-9FA5-4940-B837-7936384F61DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "3D0DC9D6-D4D6-46CB-98DA-F4FC1835B6B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBBD0747-F3FF-46D8-A3C4-8268E37BC5AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.7:rc1:*:*:*:*:*:*", "matchCriteriaId": "3F759F27-008E-47FB-AC0A-EF11DA19918E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.7:rc2:*:*:*:*:*:*", "matchCriteriaId": "D15C82BA-BD1F-4A19-A907-E6C30042F537", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "2E802481-C8BD-4218-8CDC-5DB112DA946C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "D6FC8A53-E3C0-4660-BE75-2B5B8B4F8160", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "93C020CD-D0EA-4B3E-B33C-F900B08B28FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:rc1:*:*:*:*:*:*", "matchCriteriaId": "0004AADE-1652-4242-A97D-E9818FE03CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:rc2:*:*:*:*:*:*", "matchCriteriaId": "543E9C91-60FE-43AE-9B94-08DD730BA814", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:rc3:*:*:*:*:*:*", "matchCriteriaId": "252849FA-F46E-4F5A-A488-AA53574CA884", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "9EB89B4F-9546-4DF0-B69F-1B9F289BB1E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "2E254415-1D59-4A77-80FB-AE3EF10FBB32", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.12:rc1:*:*:*:*:*:*", "matchCriteriaId": "DF2407D0-C324-45C4-9FBB-4294F747DBDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "F23A36CC-9AA2-4559-946D-6D0621664342", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.13:rc1:*:*:*:*:*:*", "matchCriteriaId": "89C40652-E180-416A-B88A-E6313530E98A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "A28C2C5D-A573-4036-A600-BE28A3E417B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.15:rc2:*:*:*:*:*:*", "matchCriteriaId": "EE162390-359F-4C5D-902B-275FB1FC3EF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "4A0A3750-0D34-4FB5-B897-17CA0D0B7CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "D11BE58D-5B7E-4BB5-988A-7FC2E4B92C4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "22631AE6-5DA1-46C6-A239-C232DA0D0E7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.18:rc1:*:*:*:*:*:*", "matchCriteriaId": "9F5CB8CC-4CC1-4A1B-8AD1-C876D1BC80EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.18:rc2:*:*:*:*:*:*", "matchCriteriaId": "8591DB43-EAA0-4D58-BA23-EAD916DEA3DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "4E4747F8-1AFC-4AEF-82D8-D6604FB5222E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.19:rc1:*:*:*:*:*:*", "matchCriteriaId": "B82172C9-EA5B-4FC9-A445-0A297AE56FF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.19:rc2:*:*:*:*:*:*", "matchCriteriaId": "0C71CDAB-A299-4F1D-942D-851C899E63BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.19:rc3:*:*:*:*:*:*", "matchCriteriaId": "E2FA9AB9-4C83-45A3-9772-3A16030DBF1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "A88C639A-9229-4D99-9087-1B0B95539BD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.20:rc1:*:*:*:*:*:*", "matchCriteriaId": "0B7DE987-7351-495A-8776-37E6B7BF0C0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.20:rc2:*:*:*:*:*:*", "matchCriteriaId": "CB5823CC-941F-47AB-AD1F-325181D40E60", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "712AF374-846D-4F21-91C4-1BA9AB33E46D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "E431AF4E-C6A8-424F-9205-01F5FDFB3306", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "52BE29C5-C2C3-4414-A8E1-4D4D926F6E65", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "87BBDF0F-7A23-48BA-98BC-0EDEDD2CDDF8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Asterisk Open Source 1.4.x before 1.4.40.1, 1.6.1.x before 1.6.1.25, 1.6.2.x before 1.6.2.17.3, and 1.8.x before 1.8.3.3 and Asterisk Business Edition C.x.x before C.3.6.4 do not restrict the number of unauthenticated sessions to certain interfaces, which allows remote attackers to cause a denial of service (file descriptor exhaustion and disk space exhaustion) via a series of TCP connections." }, { "lang": "es", "value": "Asterisk Open Source v1.4.x antes de v1.4.40.1, v1.6.1.x antes de v1.6.1.25, v1.6.2.x antes v1.6.2.17.3, y v1.8.x antes de v1.8.3.3 y Asterisk Business Edition Cxx antes vC.3.6 0.4 no restringen el n\u00famero de sesiones no autenticadas a ciertas interfaces, que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (agotamiento de descriptor de archivo y el agotamiento de espacio en disco) a trav\u00e9s de una serie de conexiones TCP." } ], "id": "CVE-2011-1507", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-04-27T00:55:04.523", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.digium.com/pub/security/AST-2011-005.html" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058922.html" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/059702.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/44197" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/44529" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1025432" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2225" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/1086" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2011/1107" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2011/1188" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=698916" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.digium.com/pub/security/AST-2011-005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058922.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/059702.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/44197" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/44529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1025432" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2225" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/1086" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/1107" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/1188" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=698916" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-11-24 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
ConfBridge in Asterisk 11.x before 11.14.1 and Certified Asterisk 11.6 before 11.6-cert8 does not properly handle state changes, which allows remote attackers to cause a denial of service (channel hang and memory consumption) by causing transitions to be delayed, which triggers a state change from hung up to waiting for media.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digium | asterisk | * | |
digium | certified_asterisk | 11.6 | |
digium | certified_asterisk | 11.6 | |
digium | certified_asterisk | 11.6 | |
digium | certified_asterisk | 11.6 | |
digium | certified_asterisk | 11.6 | |
digium | certified_asterisk | 11.6 | |
digium | certified_asterisk | 11.6 | |
digium | certified_asterisk | 11.6.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:lts:*:*:*", "matchCriteriaId": "6A0AB389-2564-4C10-86EB-130672C62AC1", "versionEndIncluding": "11.14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:lts:*:*:*", "matchCriteriaId": "6AD7C9B3-D029-4E05-8E80-3ADA904FAC1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:lts:*:*:*", "matchCriteriaId": "CE71221B-4D55-4643-B6D1-307B2CF41F98", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:lts:*:*:*", "matchCriteriaId": "88124275-9BEB-4D53-9E4D-1AC8C52F2D0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert4:*:*:lts:*:*:*", "matchCriteriaId": "4F3CEFEF-72B6-4B58-81FE-01BCEEFB3013", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert5:*:*:lts:*:*:*", "matchCriteriaId": "AA637187-0EAE-4756-AD72-A0B2FABCA070", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert6:*:*:lts:*:*:*", "matchCriteriaId": "6DAF6784-0B31-4104-9D85-473D5AFAB785", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert7:*:*:lts:*:*:*", "matchCriteriaId": "77B06B83-D62C-4A0E-BE94-83C9A02CE55A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6.0:*:*:*:lts:*:*:*", "matchCriteriaId": "D6EE9895-FB94-451D-8701-8C0DD8F5BED0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ConfBridge in Asterisk 11.x before 11.14.1 and Certified Asterisk 11.6 before 11.6-cert8 does not properly handle state changes, which allows remote attackers to cause a denial of service (channel hang and memory consumption) by causing transitions to be delayed, which triggers a state change from hung up to waiting for media." }, { "lang": "es", "value": "ConfBridge en Asterisk 11.x anterior a 11.14.1 y Certified Asterisk 11.6 anterior a 11.6-cert8 no maneja debida mente los cambios de estado, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (cuelgue de canal y consumo de memoria) al causar que transiciones se retrasen, lo que provoca un cambio de estado de estar colgado a estar esperado medios." } ], "id": "CVE-2014-8414", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-11-24T15:59:06.403", "references": [ { "source": "cve@mitre.org", "url": "http://downloads.asterisk.org/pub/security/AST-2014-014.html" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2014/Nov/67" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://downloads.asterisk.org/pub/security/AST-2014-014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2014/Nov/67" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-04-18 20:02
Modified
2025-04-03 01:03
Severity ?
Summary
Integer signedness error in format_jpeg.c in Asterisk 1.2.6 and earlier allows remote attackers to execute arbitrary code via a length value that passes a length check as a negative number, but triggers a buffer overflow when it is used as an unsigned length.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digium | asterisk | * | |
digium | asterisk | 0.1.0 | |
digium | asterisk | 0.1.1 | |
digium | asterisk | 0.1.2 | |
digium | asterisk | 0.1.3 | |
digium | asterisk | 0.1.4 | |
digium | asterisk | 0.1.5 | |
digium | asterisk | 0.1.6 | |
digium | asterisk | 0.1.7 | |
digium | asterisk | 0.1.8 | |
digium | asterisk | 0.1.9 | |
digium | asterisk | 0.1.9.1 | |
digium | asterisk | 0.1.10 | |
digium | asterisk | 0.1.11 | |
digium | asterisk | 0.1.12 | |
digium | asterisk | 0.2 | |
digium | asterisk | 0.2.0 | |
digium | asterisk | 0.3 | |
digium | asterisk | 0.3.0 | |
digium | asterisk | 0.4 | |
digium | asterisk | 0.4.0 | |
digium | asterisk | 0.5.0 | |
digium | asterisk | 0.7.0 | |
digium | asterisk | 0.7.1 | |
digium | asterisk | 0.7.2 | |
digium | asterisk | 1.0.0 | |
digium | asterisk | 1.0.1 | |
digium | asterisk | 1.0.2 | |
digium | asterisk | 1.0.3 | |
digium | asterisk | 1.0.4 | |
digium | asterisk | 1.0.5 | |
digium | asterisk | 1.0.6 | |
digium | asterisk | 1.0.7 | |
digium | asterisk | 1.0.8 | |
digium | asterisk | 1.0.9 | |
digium | asterisk | 1.0_rc1 | |
digium | asterisk | 1.0_rc2 | |
digium | asterisk | 1.2.0_beta1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "D52340CE-D832-43A6-9552-5A5E014D1AA7", "versionEndIncluding": "1.2.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:0.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "864D95C2-9B1B-4EB4-82CD-3BA5E063FEED", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D0FB4B52-69CA-45DA-AE22-E6667E8B98FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:0.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "BD8FF789-3B09-4974-B62F-CCD7F5AA2BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:0.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "F4FA92F7-46BB-444C-ADAB-4B550CD0B69C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:0.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "A003A2C3-1C4F-4A76-BABE-C55A761E3321", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:0.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "A063E6CD-16F8-42E0-A9A2-4D33C10F7EF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:0.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "6EBC7FE3-D810-487C-8FD3-27B8729DCA41", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:0.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "8C08E661-23D9-437F-844F-6BE8183CF3CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:0.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "1D030C12-C2C6-4714-B776-2EF7ECF1A591", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:0.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "CE5A8210-2E7C-465C-9751-CB362AADC224", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:0.1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "82621C2B-B5F0-4E70-A619-0213005DADB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:0.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "F9DBCFB5-65BF-46FE-AC19-2557B6C0BD01", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:0.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "99C185C9-9592-43A1-9811-80E16032F396", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:0.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "5BD696CD-3B63-4C8B-966E-EE00F44CA44C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9750B74B-F766-4869-880B-4E5E41D90533", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:0.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BE096C63-221B-4746-B8B6-9314C4CD6FFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "33DCA1D9-0D47-4F0A-A78F-F85FADE0C9B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:0.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "24CE1C95-D4C7-4662-AD0D-5219335BAF40", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "ACC453F5-C46A-45E9-B7DE-3C5BF752F305", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "9149505F-D47B-40C3-93EB-A3C647A1AC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:0.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "94FC8F82-D648-4127-9914-27414358AC33", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:0.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "0CCCA63B-AB59-4827-BD6F-4AF0155151F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "16FC9C13-ADDD-4F09-B977-EE0DEF598B1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "2C20296F-F70A-4D3C-A062-B6054617841C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "E9A92B4D-16A7-4D99-8F3A-2E5D3B12C86B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "16783925-8EC5-431F-90B5-93B16DCC10B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9C59AF9E-FEC7-44AB-B392-49DB11BAEB0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "325C4452-6541-46F6-A86C-6D6987583FB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5424B5B4-99B3-4695-8E0D-7E8DC8B88C3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "62BDF9F0-1AFD-47E6-9054-A9FC6D422DD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "5A8D2125-019A-4B73-9E1A-98E745148803", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "46C60C04-EF59-4F5C-96E5-A6E693EA9A06", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3636BB44-DF4D-40AB-8EBB-1EC5D911E4A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "B3B3C254-29D9-4911-89A9-AC0CD9EB13F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.0_rc1:*:*:*:*:*:*:*", "matchCriteriaId": "E49F2D76-DC82-4289-8891-4982795D896A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.0_rc2:*:*:*:*:*:*:*", "matchCriteriaId": "203237E0-BB44-42D0-B65B-CBDAAA68A1BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.0_beta1:*:*:*:*:*:*:*", "matchCriteriaId": "4042CC21-F3CB-4C77-9E60-AF8AA9A191C7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer signedness error in format_jpeg.c in Asterisk 1.2.6 and earlier allows remote attackers to execute arbitrary code via a length value that passes a length check as a negative number, but triggers a buffer overflow when it is used as an unsigned length." } ], "id": "CVE-2006-1827", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-04-18T20:02:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://ftp.digium.com/pub/asterisk/releases/asterisk-1.2.7-patch.gz" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/19800" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/19872" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/19897" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.cipher.org.uk/index.php?p=advisories/Asterisk_Codec_Integer_Overflow_07-04-2006.advisory" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2006/dsa-1048" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/linux/security/advisories/2006_04_28.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/17561" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/1478" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://ftp.digium.com/pub/asterisk/releases/asterisk-1.2.7-patch.gz" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/19800" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/19872" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/19897" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.cipher.org.uk/index.php?p=advisories/Asterisk_Codec_Integer_Overflow_07-04-2006.advisory" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2006/dsa-1048" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2006_04_28.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/17561" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/1478" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-04-18 22:14
Modified
2025-04-12 10:46
Severity ?
Summary
main/http.c in Asterisk Open Source 1.8.x before 1.8.26.1, 11.8.x before 11.8.1, and 12.1.x before 12.1.1, and Certified Asterisk 1.8.x before 1.8.15-cert5 and 11.6 before 11.6-cert2, allows remote attackers to cause a denial of service (stack consumption) and possibly execute arbitrary code via an HTTP request with a large number of Cookie headers.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6344E43-E8AA-4340-B3A7-72F5D6A5D184", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "4C170C1C-909D-4439-91B5-DB1A9CD150C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EE821BE5-B1D3-4854-A700-3A83E5F15724", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "149C57CA-0B4B-4220-87FC-432418D1C393", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "035595D5-BBEC-4D85-AD7A-A2C932D2BA70", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "6DAF5655-F09F-47F8-AFA6-4B95F77A57F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F8E001D8-0A7B-4FDD-88E3-E124ED32B81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9D5CFFBD-785F-4417-A54A-F3565FD6E736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "D30EF999-92D1-4B19-8E32-1E4B35DE4EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "A67D156B-9C43-444F-ADEC-B21D99D1433C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "893EB152-6444-43DB-8714-9735354C873A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8447EE7-A834-41D7-9204-07BD3752870C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C04F2C9-5672-42F2-B664-A3EE4C954C29", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "33465668-4C91-4619-960A-D26D77853E53", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "CAD08674-0B44-44EA-940B-6812E2D5077D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "EEE87710-A129-43AA-BA08-8001848975FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F582C6E-5DA0-4D72-A40E-66BDBC5CF2B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CEBB8-01B3-4A05-AFE8-37A143C9833E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "522733A7-E89E-4BFD-AC93-D6882636E880", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "2FAC47DD-B613-43E4-B9BF-6120B81D9789", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "86D20CB5-60E8-405E-B387-CF80C7DA5E07", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "71AB5A01-5961-4053-9111-CF32C6473A00", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*", "matchCriteriaId": "77D8E1DC-041F-4B87-AF9A-E0EC4D6A4BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7CCCB892-30CE-4BEF-904E-5D957F94D0EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "F156798F-F2EF-4366-B17E-03165AB437D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "9EFBB9A6-DD1D-436E-919F-74A3E4F40396", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "054E34C8-B6A5-48C7-938E-D3C268E0E8BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*", "matchCriteriaId": "1DCECA72-533A-4A95-AB19-20C5F09A1B01", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*", "matchCriteriaId": "0E2309F8-AFEE-4150-99D1-BA606432ED73", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*", "matchCriteriaId": "7785F282-BFA0-400A-8398-872ACCA4BF37", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1278D3FB-78C6-4F7D-A845-0A93D4F6E2B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "C00A6EFB-A848-46D3-AAD7-FD8140007E42", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "CB6E3972-5C53-4B6D-BFE1-67E1122EA013", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "048617A0-A783-4519-A947-35220D4CD786", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "DD493A41-E686-444C-A34E-412804510F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "87D25FD6-CC3A-4AB0-B7B1-67D07386F99D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C402E9E-09CC-4EFA-AC27-156437B05B22", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C8A41F9C-D2F4-47A9-80CD-2B1BF6B0CB63", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "627FF5B9-E5A8-4DBC-A891-B175011E72A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6146EB2E-BA32-4408-B10B-A711EC39C580", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "1C863324-05AE-4FCA-BD2E-39040A468DCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A85F51E7-0AAE-4F3B-9F90-BD2E31255822", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "315FB0D4-D4A4-4369-BFB8-F2CAEB429015", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "DC74D6C5-F410-4B68-AF92-056B727193A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "B70911F8-A526-4600-8198-03FF4CCB28DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA60A9C9-C2EF-4971-BEFB-FF687DAEF2F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:-:*:*:*:*:*:*", "matchCriteriaId": "984CD6D9-4A54-4065-8401-DC555AB95425", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:patch:*:*:*:*:*:*", "matchCriteriaId": "CDE13439-4124-4BDE-A068-460BCF96419B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "BAFB22FA-CC24-4AFE-AC83-2D044563F7CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "00F3EB0D-7C63-46B5-BA95-8486B9716C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "00C1BF3B-7593-478D-9AAA-153901C70286", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "82423EC2-FA29-4AF6-86C3-6AC6DFDC4DC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "5F86406A-0936-4A06-88FB-4137A64498EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "672CE4C0-EBD6-470B-937E-810FF1C4CDBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "88DB1105-74D8-4312-9D02-D1E21F2E785C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "404C0557-6229-4D90-BFDD-54AFFCCE6A19", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:-:*:*:*:*:*:*", "matchCriteriaId": "3F4DC562-649E-4105-8B3E-43F02BD593FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6D1D26CC-891F-4396-B7D7-30D712829E71", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F25B61EA-F4D1-452A-9D96-B8DFDD719B0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9324AB96-EC99-4F04-A0A9-00F936C86EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "1B8B5E76-4A74-4E88-8A6F-C23538B7642A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "BDB6BBCA-47CE-49B8-9706-AFDE4BE46550", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "8BFF65E2-692B-4C39-88FC-6DED8D9A7258", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "5260E309-9320-4DB8-A918-7D215BF95D2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:-:*:*:*:*:*:*", "matchCriteriaId": "58F4BFC9-E02A-4121-8D34-99022AB8B45A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "60AFF340-A866-4CFE-9334-53B95FD4AA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "74E50309-CD7D-41F7-97DA-A7E451D0796A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "6FD3F8F8-820E-4C29-9F8F-023D1DB999CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "C33A6419-0D00-49D6-9A48-2B633610AAED", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "447E07C9-4A25-418D-B53F-609B78EE4C21", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E8AE686-B618-4B0D-BD27-1F96295E964D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:-:*:*:*:*:*:*", "matchCriteriaId": "9C806F87-C897-48E4-8533-A4EBC6B77078", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:patch:*:*:*:*:*:*", "matchCriteriaId": "08B8C143-93FF-44DD-8F61-6F4FEE977371", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E9751C0A-84F5-4A43-8282-12A9DE559569", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F67E2694-F6F1-482C-91F2-D9FD856EA31B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "5E2D53AA-8D50-445F-9500-2F580F260DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.1:-:*:*:*:*:*:*", "matchCriteriaId": "8859F234-5066-40DD-862C-0F3CCA98AFB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.1:patch:*:*:*:*:*:*", "matchCriteriaId": "75962F03-EC19-4920-9FA7-2D422E6E83F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12:*:*:*:*:*:*:*", "matchCriteriaId": "8D9D7D88-D64F-4F54-8C84-6AC45FBD36F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "F67AB282-591C-4ED7-9750-C593A38D5D7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:-:*:*:*:*:*:*", "matchCriteriaId": "B5D0BB0E-1BB0-4F31-9C5D-DC1A069E52DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "C9F8F881-2BF7-44AB-8756-54A06801EB11", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "36EFF3C4-4D00-4BC5-94B9-403BB00C6AB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "5E434F10-395E-426E-A988-4CDA504577D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "33FE3DCE-74B5-49A4-BC18-34B22CA83947", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "FF2E25F3-053D-4F7D-A35D-706A401CCAA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "8880AE7C-3E44-4B76-B500-E93868D4CF5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7C94269D-A271-42AC-A44C-102C814E564B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E7E5B826-D3D5-4D2D-BB4D-2C1BEDE92456", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "5BA564F7-7A69-4805-8C8C-C2EB5E12A6E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.0:-:*:*:*:*:*:*", "matchCriteriaId": "2A153336-10C4-4C42-AC66-AC1351887EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.0:patch:*:*:*:*:*:*", "matchCriteriaId": "0C2FF4E9-2513-4022-AF80-6F44A2287D6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "DF6FA464-F9D3-4674-844B-A2B2E2C42A51", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "44722C8B-BB37-4444-A58A-F01D0B3B4DDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "C4FABFDB-D99A-4F83-8FEE-3BFA36BA4061", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.1:-:*:*:*:*:*:*", "matchCriteriaId": "43E00618-19F6-4828-818A-95C9106097B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.1:patch:*:*:*:*:*:*", "matchCriteriaId": "CEC4F4AE-7BD8-437F-8838-FE564BCB7FA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "A842E112-8974-4E74-AD56-1DEF5B5DD9F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.15.0:-:*:*:*:*:*:*", "matchCriteriaId": "2BC3B463-6B2C-42AF-BE13-50B7D63E7F05", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.15.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D9ACBC01-8A9D-43A5-A825-1CC9670417A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "61E7199F-EACE-431A-8ADD-B96A6FCDBC49", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA7CD0E5-8E69-43B5-A5FF-8B122475CC00", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.16.0:-:*:*:*:*:*:*", "matchCriteriaId": "2799111C-06DB-4979-8F81-A8C09D53E5F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.16.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "F4BEA1B2-2103-4E25-92A9-DB107D6D4AD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.16.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "2AD9AFFB-F903-43DD-9C1D-4D8E83EA25C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "6F368897-A481-42DD-A8B0-8AD43A5FD68B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:-:*:*:*:*:*:*", "matchCriteriaId": "4F3C35F1-CBF2-4F77-AC19-574DEF2652A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:patch:*:*:*:*:*:*", "matchCriteriaId": "75EA94FD-D16A-49BC-A418-36EFC187EC7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6BA8F4AF-26C0-4A69-B489-16E7A56E5123", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FE82D53D-092D-4B36-A979-23E9A5E07A78", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "27365383-72DB-4683-9A67-CF553FF2620A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "46EE63D4-CA9C-4DF4-AF85-B8AC2E3F844A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.0:-:*:*:*:*:*:*", "matchCriteriaId": "A14FC2A1-29D5-49FE-92A9-D61833BF1C95", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "91407E03-4E98-4DD9-B584-E5BB74F09B9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "669CC22C-45E5-40AB-9A95-D7DFD694B688", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "80A38E0C-45D9-4353-8426-87A4CFA371DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:-:*:*:*:*:*:*", "matchCriteriaId": "5E3C5C1E-67E9-401A-BA52-FCB32CA4473C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "54A934AE-AB7C-4D10-8BA2-9C54410C648F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "7A7C5A8E-35E6-4B86-8502-1970031AB987", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "1FA4C14B-A01C-4CFE-8985-317ACCDAD209", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:-:*:*:*:*:*:*", "matchCriteriaId": "501F5764-BBC2-426A-AF01-7FB477850073", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:patch:*:*:*:*:*:*", "matchCriteriaId": "FDB35CE5-4EDB-4949-A5E4-1BD721CCA469", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "619704FF-2F0C-47E8-A340-58135CEE6B89", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E412E336-871A-4CAC-97E5-FB203BB9349D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.1:-:*:*:*:*:*:*", "matchCriteriaId": "82ED9CD2-504E-4D7B-B242-2511A7730776", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.1:patch:*:*:*:*:*:*", "matchCriteriaId": "EF6E50F5-605A-4D2B-B55D-8AB251532E8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.2:-:*:*:*:*:*:*", "matchCriteriaId": "F6C796AE-95EE-4EAB-959C-1C1353C565A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.2:patch:*:*:*:*:*:*", "matchCriteriaId": "EEAF3B2E-E520-4F43-ACC5-0F01A6247199", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.21.0:-:*:*:*:*:*:*", "matchCriteriaId": "085D4102-E2E8-496C-85B7-714FD3639BE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.21.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "FC1A0E66-63F4-4BD0-8C9A-3D23A116EE08", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.21.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "79963FF0-5ED6-41B6-8E60-146BD7879518", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.22.0:-:*:*:*:*:*:*", "matchCriteriaId": "E0ABBB2C-19EC-4D6C-A1EA-AEF0ABA4123D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.22.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0787BC7B-9464-4AAA-896B-C028ECF8E397", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.22.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "84C0FBC8-9CD1-4135-94C7-BE90A7C94625", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:-:*:*:*:*:*:*", "matchCriteriaId": "981F3994-392D-47DB-97DA-AC15BA070A36", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:patch:*:*:*:*:*:*", "matchCriteriaId": "94691EE6-266F-46CE-B388-0289EB39D91A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "FD3948A1-B5A6-4702-9187-A7720E81B7F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "BC097BB6-02E9-4F48-98CB-B5F31B41009C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C2FD962-B1D5-41E5-884E-0C3F7F9DACE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.24.0:-:*:*:*:*:*:*", "matchCriteriaId": "096E966A-878B-426F-AB40-BB476B17B969", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.24.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "852DAF2A-86F3-4D05-91DC-6A2FBC214736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.24.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "7D721486-3043-4380-A73C-44B4DD0E34C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "1F29E2EE-B6E8-4E55-84A8-3BD0658387EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.25.0:-:*:*:*:*:*:*", "matchCriteriaId": "837BF2BD-814F-4503-91DF-EE16B5A4921D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.25.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "15FCDDB3-62D8-446C-B57C-F3BBFBD13491", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.25.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "03512BDE-E441-46F6-88B7-16A2468CA199", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.26.0:-:*:*:*:*:*:*", "matchCriteriaId": "902CAF9D-9D02-47FA-AE2E-EC1268A32BA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.26.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "80AD87B5-B796-4C44-8A6D-0B22AA2903CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:-:*:*:*:*:*:*", "matchCriteriaId": "03298D9F-CFB8-48F9-BD0C-8A0BEB0760C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "87FCBE6A-C1CD-48EF-A435-4CEADD46C917", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "42E0E639-70A2-41EE-9B34-A9223D1958AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "32E84D64-0CB8-46BF-BD3F-8CA2E0CE4C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:-:*:*:*:*:*:*", "matchCriteriaId": "F3DE062D-4E87-4691-A664-D9E7C02036EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3B4D6D24-A718-4962-AD4E-F19AFB03BFF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "BE2F0D0D-761C-4338-93F0-506E94E57000", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "3D38DFCA-E357-4A28-8F03-FDADF40A5185", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*", "matchCriteriaId": "5991814D-CA77-4C25-90D2-DB542B17E0AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "matchCriteriaId": "FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "93F2B062-09B4-44F1-87E4-6104B757B557", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "F2877B09-B0B9-4AD4-906A-D40E25DDC4BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "11AAE0EA-D7EB-4341-A412-FBCDC99565A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "37F93124-25D9-44ED-B4AB-1B3552FCAB09", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "E4CB22F6-9F63-427C-B2D2-7ABB9B4F7694", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "758AB27B-7C40-41ED-9FC3-BE3D682EE48A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "07D3186A-CD6F-432A-8653-4CFBA37B9864", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "746FB2E6-EF66-4EF3-946C-111FB7728EBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "91D933DB-06F7-45A4-A517-BFAEC82DDB7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "3AAB500F-8F0D-4534-B659-C495D1799913", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "5F5C5156-CC72-4AB5-A927-E874199EBD8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.1.0:-:*:*:*:*:*:*", "matchCriteriaId": "AB912D4D-6BA4-4AEF-BBFD-EABFED240015", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "68C78C16-3807-4272-9B46-9D9AF5150879", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.2.0:-:*:*:*:*:*:*", "matchCriteriaId": "02E13D3A-B37B-4215-82E0-3FCE5E35B00A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "BE0F93D1-7602-47AC-9ACE-AA850D7DFD23", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.3.0:-:*:*:*:*:*:*", "matchCriteriaId": "956BCED3-1818-4673-A0F4-E7F03F366D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0B58ACCC-0255-46B1-8517-EDCD85AA0F35", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "A921B590-57C2-4E0A-B28B-D0E48F5E1B58", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.3.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "70F0AE7B-9E53-4E3B-AA9E-EAF7C4C31E1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.4.0:-:*:*:*:*:*:*", "matchCriteriaId": "5DE6F187-7236-4622-BD62-1E5F0742B41B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "F70DDB6D-BE16-4375-87AE-E5E2B5862D17", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.4.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6910E07C-3ACA-414F-B468-13E4BF9BE938", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.4.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "837A07D7-C2FD-4077-A0AD-AF2147E04B84", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.5.0:-:*:*:*:*:*:*", "matchCriteriaId": "B2A99209-E8C5-44E6-A8DA-7FC07FBA6D87", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "18985B4A-4C54-4EC6-9274-15E7DCFEC94D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.6.0:-:*:*:*:*:*:*", "matchCriteriaId": "48AE70AD-85BE-44DE-BC75-1690C27821B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "804F861A-81E1-45C5-A7D3-0E73770AC155", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "0AE503BD-F9BD-4396-B27D-184AE06F594D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9CD9A213-27F7-410E-97B1-E7405B4FCECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.7.0:-:*:*:*:*:*:*", "matchCriteriaId": "10FFDE4F-0B30-43C3-9475-80259D5E9055", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5F30E2AB-B354-4583-9D76-9DF1727407A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "DBDFE57E-EEBF-4722-B6D0-147F72018DE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.8.0:-:*:*:*:*:*:*", "matchCriteriaId": "902A2600-49A7-4013-A621-9EE94F1E8435", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7021D54A-D443-492A-AE8C-62F2B85A1F37", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "B003CB5A-A95A-481F-B762-79C476829D81", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "84C8BB88-FBE3-4C82-9D53-E34AA7B6A73E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "F8037EB0-42FA-45BA-9E8E-D279432EC4CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "E374559C-E550-4BB9-9682-9C4535EAE9A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.9.0:-:*:*:*:*:*:*", "matchCriteriaId": "FFFB7E8B-C963-4ACB-AE37-9E4938A5462E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "DF83EAD3-3CC1-4C1B-AAB8-0FE03BB67EC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.9.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E3F75AF0-A4E0-425E-B707-ED1F58C9CC83", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.9.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "745EC4D8-5E19-48C8-8609-11A74DC18266", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.10.0:-:*:*:*:*:*:*", "matchCriteriaId": "F1871DC4-AA58-4C04-9D6A-4FF383C56405", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8560DBD-A70E-4033-AE2E-96DA373AB425", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.10.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E08ECE50-3A53-45C1-8BEA-8B9E024E22F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.10.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "59C2E58B-EEB3-4E8D-940C-2DF846923B19", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.10.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "D40F2ADC-6F79-410F-9063-1354C15F0D8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11.0:-:*:*:*:*:*:*", "matchCriteriaId": "69E55195-84CC-46DB-9E49-DEB864DF0659", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7F58B52D-9510-465F-8BFB-6896B4D36F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "59E72AD4-90BE-4C3B-B457-31FF193712FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "81EB266E-40BC-45EA-8EDB-4766011C460B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.12.0:-:*:*:*:*:*:*", "matchCriteriaId": "E23FCBC3-30EF-47BC-AEFE-073E84B6DBA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.12.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5AB33EDF-29D7-4092-91FE-505B39D3E57B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.12.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "4F698874-028E-410B-90FE-FDD441F55C32", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.12.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "081DA344-7266-4D67-8B92-830F43B42CC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.13.0:-:*:*:*:*:*:*", "matchCriteriaId": "01851B4A-F7CB-4263-B06C-92D39A693530", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.13.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6BB95638-D09F-4F02-9076-49BE93F2A407", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.13.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6E2DD3AF-EF01-4A1A-AF9A-98575E36D088", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.14.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "163E8F93-432A-4F68-B309-7A38AE1A30FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.14.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F53C384F-75DD-4A29-8907-BA95F08B1465", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:-:*:*:*:*:*:*", "matchCriteriaId": "6BB940E4-E612-4B27-9188-E794665191B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1:*:*:*:*:*:*", "matchCriteriaId": "2365F1EE-16A4-4293-B80E-A51CD6A2F112", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1_rc1:*:*:*:*:*:*", "matchCriteriaId": "6952FFDE-92D0-4A75-AABB-113E6FAF5A31", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1_rc2:*:*:*:*:*:*", "matchCriteriaId": "5735354A-CF57-4A9A-9607-169CE50E0655", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1_rc3:*:*:*:*:*:*", "matchCriteriaId": "38E0B2C4-55EA-4712-8E75-24A5718F9FD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert2:*:*:*:*:*:*", "matchCriteriaId": "F087C546-FBCA-4D0D-A023-8F9384CD160C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert3:*:*:*:*:*:*", "matchCriteriaId": "832F5503-6354-4E39-B927-3BA9606A372D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert4:*:*:*:*:*:*", "matchCriteriaId": "9E23AF8A-63B2-4597-8E78-A4672B0C44B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:*:*:*:*", "matchCriteriaId": "322694EF-B086-4BE7-A9F0-41D3A9C245FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc1:*:*:*:*:*:*", "matchCriteriaId": "781AC882-80DD-4176-8E4F-220343B15F68", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc2:*:*:*:*:*:*", "matchCriteriaId": "770CCEEA-B121-454B-BD36-3FC1B262998A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6.0:-:*:*:*:*:*:*", "matchCriteriaId": "CCDDF5C2-9B45-4811-90F6-984EF4B220CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "56849E34-B192-46A8-A517-C7C184A901B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "4610D544-156F-4E9A-BC46-9E0FF8D5D641", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "main/http.c in Asterisk Open Source 1.8.x before 1.8.26.1, 11.8.x before 11.8.1, and 12.1.x before 12.1.1, and Certified Asterisk 1.8.x before 1.8.15-cert5 and 11.6 before 11.6-cert2, allows remote attackers to cause a denial of service (stack consumption) and possibly execute arbitrary code via an HTTP request with a large number of Cookie headers." }, { "lang": "es", "value": "main/http.c en Asterisk Open Source 1.8.x anterior a 1.8.26.1, 11.8.x anterior a 11.8.1 y 12.1.x anterior a 12.1.1 y Certified Asterisk 1.8.x anterior a 1.8.15-cert5 y 11.6 anterior a 11.6-cert2, permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de pila) y posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud HTTP con un n\u00famero grande de cabeceras de cookies." } ], "id": "CVE-2014-2286", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-04-18T22:14:37.917", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-001-1.8.diff" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-001.html" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130400.html" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130426.html" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:078" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/66093" }, { "source": "cve@mitre.org", "url": "https://issues.asterisk.org/jira/browse/ASTERISK-23340" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-001-1.8.diff" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130400.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130426.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:078" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/66093" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.asterisk.org/jira/browse/ASTERISK-23340" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-14 20:15
Modified
2024-11-21 08:11
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
8.2 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
8.2 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
Summary
Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk versions 18.20.0 and prior, 20.5.0 and prior, and 21.0.0; as well as ceritifed-asterisk 18.9-cert5 and prior, the 'update' functionality of the PJSIP_HEADER dialplan function can exceed the available buffer space for storing the new value of a header. By doing so this can overwrite memory or cause a crash. This is not externally exploitable, unless dialplan is explicitly written to update a header based on data from an outside source. If the 'update' functionality is not used the vulnerability does not occur. A patch is available at commit a1ca0268254374b515fa5992f01340f7717113fa.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "2AD913C8-79A0-4FE9-9BBD-52BD3260AB2F", "versionEndIncluding": "18.20.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA2E162A-E994-4F25-AE13-D7C889394AC4", "versionEndIncluding": "20.5.0", "versionStartIncluding": "19.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:21.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3E690E3-3E92-42ED-87DD-1C6B838A3FF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:13.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "2AFE2011-05AA-45A6-A561-65C6C664DA7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert1:*:*:*:*:*:*", "matchCriteriaId": "C1117AA4-CE6B-479B-9995-A9F71C430663", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert1-rc1:*:*:*:*:*:*", "matchCriteriaId": "775041BD-5C86-42B6-8B34-E1D5171B3D87", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert1-rc2:*:*:*:*:*:*", "matchCriteriaId": "55EC2877-2FF5-4777-B118-E764A94BCE56", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert1-rc3:*:*:*:*:*:*", "matchCriteriaId": "EB0392C9-A5E9-4D71-8B8D-63FB96E055A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert1-rc4:*:*:*:*:*:*", "matchCriteriaId": "09AF962D-D4BB-40BA-B435-A59E4402931C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert2:*:*:*:*:*:*", "matchCriteriaId": "559D1063-7F37-44F8-B5C6-94758B675FDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert3:*:*:*:*:*:*", "matchCriteriaId": "185B2B4B-B246-4379-906B-9BDA7CDD4400", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:13.13.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "73D3592D-3CE5-4462-9FE8-4BCB54E74B5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:13.13.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "B3CCE9E0-5DC4-43A2-96DB-9ABEA60EC157", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:-:*:*:*:*:*:*", "matchCriteriaId": "1EAD713A-CBA2-40C3-9DE3-5366827F18C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert1:*:*:*:*:*:*", "matchCriteriaId": "A5F5A8B7-29C9-403C-9561-7B3E96F9FCA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert10:*:*:*:*:*:*", "matchCriteriaId": "F9B96A53-2263-463C-9CCA-0F29865FE500", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert11:*:*:*:*:*:*", "matchCriteriaId": "A53049F1-8551-453E-834A-68826A7AA959", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert12:*:*:*:*:*:*", "matchCriteriaId": "B224A4E9-4B6B-4187-B0D6-E4BAE2637960", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert2:*:*:*:*:*:*", "matchCriteriaId": "9501DBFF-516D-4F26-BBF6-1B453EE2A630", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert3:*:*:*:*:*:*", "matchCriteriaId": "9D3E9AC0-C0B4-4E87-8D48-2B688D28B678", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert4:*:*:*:*:*:*", "matchCriteriaId": "1A8628F6-F8D1-4C0C-BD89-8E2EEF19A5F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert5:*:*:*:*:*:*", "matchCriteriaId": "E27A6FD1-9321-4C9E-B32B-D6330CD3DC92", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert6:*:*:*:*:*:*", "matchCriteriaId": "B6BF5EDB-9D17-453D-A22E-FDDC4DCDD85B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert7:*:*:*:*:*:*", "matchCriteriaId": "4C75A21E-5D05-434B-93DE-8DAC4DD3E587", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert8:*:*:*:*:*:*", "matchCriteriaId": "1D725758-C9F5-4DB2-8C45-CC052518D3FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert9:*:*:*:*:*:*", "matchCriteriaId": "B5E2AECC-B681-4EA5-9DE5-2086BB37A5F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:18.9:cert1:*:*:*:*:*:*", "matchCriteriaId": "79EEB5E5-B79E-454B-8DCD-3272BA337A9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:18.9:cert2:*:*:*:*:*:*", "matchCriteriaId": "892BAE5D-A64E-4FE0-9A99-8C07F342A042", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:18.9:cert3:*:*:*:*:*:*", "matchCriteriaId": "1A716A45-7075-4CA6-9EF5-2DD088248A5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:18.9:cert4:*:*:*:*:*:*", "matchCriteriaId": "80EFA05B-E22D-49CE-BDD6-5C7123F1C12B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:18.9:cert5:*:*:*:*:*:*", "matchCriteriaId": "20FD475F-2B46-47C9-B535-1561E29CB7A1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk versions 18.20.0 and prior, 20.5.0 and prior, and 21.0.0; as well as ceritifed-asterisk 18.9-cert5 and prior, the \u0027update\u0027 functionality of the PJSIP_HEADER dialplan function can exceed the available buffer space for storing the new value of a header. By doing so this can overwrite memory or cause a crash. This is not externally exploitable, unless dialplan is explicitly written to update a header based on data from an outside source. If the \u0027update\u0027 functionality is not used the vulnerability does not occur. A patch is available at commit a1ca0268254374b515fa5992f01340f7717113fa." }, { "lang": "es", "value": "Asterisk es un conjunto de herramientas de telefon\u00eda y centralita privada de c\u00f3digo abierto. En las versiones de Asterisk 18.20.0 y anteriores, 20.5.0 y anteriores y 21.0.0; as\u00ed como ceritifed-asterisk 18.9-cert5 y anteriores, la funcionalidad de \u0027actualizaci\u00f3n\u0027 de la funci\u00f3n de dialplan PJSIP_HEADER puede exceder el espacio de b\u00fafer disponible para almacenar el nuevo valor de un encabezado. Al hacerlo, esto puede sobrescribir la memoria o provocar un bloqueo. Esto no se puede explotar externamente, a menos que el dialplan est\u00e9 escrito expl\u00edcitamente para actualizar un encabezado en funci\u00f3n de datos de una fuente externa. Si no se utiliza la funcionalidad de \u0027actualizaci\u00f3n\u0027, la vulnerabilidad no se produce. Hay un parche disponible en el commit a1ca0268254374b515fa5992f01340f7717113fa." } ], "id": "CVE-2023-37457", "lastModified": "2024-11-21T08:11:44.807", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-14T20:15:52.260", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/asterisk/asterisk/commit/a1ca0268254374b515fa5992f01340f7717113fa" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-98rc-4j27-74hh" }, { "source": "security-advisories@github.com", "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/asterisk/asterisk/commit/a1ca0268254374b515fa5992f01340f7717113fa" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-98rc-4j27-74hh" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-10-23 17:07
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in the SIP channel driver (channels/chan_sip.c) in Asterisk 1.2.x before 1.2.13 and 1.4.x before 1.4.0-beta3 allows remote attackers to cause a denial of service (resource consumption) via unspecified vectors that result in the creation of "a real pvt structure" that uses more resources than necessary.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digium | asterisk | 1.2.0_beta1 | |
digium | asterisk | 1.2.0_beta2 | |
digium | asterisk | 1.2.6 | |
digium | asterisk | 1.2.7 | |
digium | asterisk | 1.2.8 | |
digium | asterisk | 1.2.9 | |
digium | asterisk | 1.2.10 | |
digium | asterisk | 1.2.11 | |
digium | asterisk | 1.2.12 | |
digium | asterisk | 1.2.12.1 | |
digium | asterisk | 1.4.0 | |
digium | asterisk | 1.4.0_beta1 | |
digium | asterisk | 1.4.0_beta2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.2.0_beta1:*:*:*:*:*:*:*", "matchCriteriaId": "4042CC21-F3CB-4C77-9E60-AF8AA9A191C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.0_beta2:*:*:*:*:*:*:*", "matchCriteriaId": "C656168D-7D6A-4E84-9196-A8B170E1F7CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "C619138A-557F-419E-9832-D0FB0E9042C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "B6656EA0-4D4F-4251-A30F-48375C5CE3E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "4AAD9104-BA4A-478F-9B56-195E0F9A7DF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "4F06C361-D7DF-474B-A835-BA8886C11A80", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "175954A5-E712-41B8-BC11-4F999343063D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "1DF9E41E-8FE6-4396-A5D4-D4568600FE03", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "4457486F-E9B4-46B8-A05D-3B32F8B639A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "69417F54-D92F-46FB-9BFA-995211279C0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E56DB29-571D-4615-B347-38CF4590E463", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0_beta1:*:*:*:*:*:*:*", "matchCriteriaId": "6B909947-44E3-463E-9FAD-76C8E21A54E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0_beta2:*:*:*:*:*:*:*", "matchCriteriaId": "1FB2F8AA-B70B-4280-BDBD-023037C16D70", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the SIP channel driver (channels/chan_sip.c) in Asterisk 1.2.x before 1.2.13 and 1.4.x before 1.4.0-beta3 allows remote attackers to cause a denial of service (resource consumption) via unspecified vectors that result in the creation of \"a real pvt structure\" that uses more resources than necessary." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el controlador de canal SIP (channels/chan_sip.c) en ASterisk 1.2.x anteriores a 1.2.13 y 1.4.x aneriores a 1.4.0-beta3 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (agotamiento de recursos) a trav\u00e9s de vectores no especificados que resultan en la creaci\u00f3n de una \"estructura pvt real\" que usa m\u00e1s recursos de los necesarios." } ], "evaluatorSolution": "This vulnerability is addressed in the following product releases:\r\nDigium, Asterisk, 1.4.0-beta2\r\nDigium, Asterisk, 1.2.13", "id": "CVE-2006-5445", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-10-23T17:07:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://ftp.digium.com/pub/asterisk/releases/ChangeLog-1.2.13" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/22651" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/22979" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.asterisk.org/node/109" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.asterisk.org/node/110" }, { "source": "cve@mitre.org", "url": "http://www.gentoo.org/security/en/glsa/glsa-200610-15.xml" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/linux/security/advisories/2006_69_asterisk.html" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/29973" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/449183/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/20835" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/4098" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://ftp.digium.com/pub/asterisk/releases/ChangeLog-1.2.13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/22651" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/22979" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.asterisk.org/node/109" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.asterisk.org/node/110" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.gentoo.org/security/en/glsa/glsa-200610-15.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2006_69_asterisk.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/29973" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/449183/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/20835" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/4098" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29664" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-09-18 18:55
Modified
2025-04-11 00:51
Severity ?
Summary
Stack-based buffer overflow in the ast_parse_digest function in main/utils.c in Asterisk 1.8.x before 1.8.10.1 and 10.x before 10.2.1 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string in an HTTP Digest Authentication header.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6344E43-E8AA-4340-B3A7-72F5D6A5D184", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "4C170C1C-909D-4439-91B5-DB1A9CD150C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EE821BE5-B1D3-4854-A700-3A83E5F15724", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "149C57CA-0B4B-4220-87FC-432418D1C393", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "035595D5-BBEC-4D85-AD7A-A2C932D2BA70", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "6DAF5655-F09F-47F8-AFA6-4B95F77A57F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F8E001D8-0A7B-4FDD-88E3-E124ED32B81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9D5CFFBD-785F-4417-A54A-F3565FD6E736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "D30EF999-92D1-4B19-8E32-1E4B35DE4EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "A67D156B-9C43-444F-ADEC-B21D99D1433C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C04F2C9-5672-42F2-B664-A3EE4C954C29", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "33465668-4C91-4619-960A-D26D77853E53", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "CAD08674-0B44-44EA-940B-6812E2D5077D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "EEE87710-A129-43AA-BA08-8001848975FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F582C6E-5DA0-4D72-A40E-66BDBC5CF2B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CEBB8-01B3-4A05-AFE8-37A143C9833E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "522733A7-E89E-4BFD-AC93-D6882636E880", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "2FAC47DD-B613-43E4-B9BF-6120B81D9789", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "86D20CB5-60E8-405E-B387-CF80C7DA5E07", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "71AB5A01-5961-4053-9111-CF32C6473A00", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*", "matchCriteriaId": "77D8E1DC-041F-4B87-AF9A-E0EC4D6A4BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7CCCB892-30CE-4BEF-904E-5D957F94D0EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "F156798F-F2EF-4366-B17E-03165AB437D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "9EFBB9A6-DD1D-436E-919F-74A3E4F40396", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "054E34C8-B6A5-48C7-938E-D3C268E0E8BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*", "matchCriteriaId": "1DCECA72-533A-4A95-AB19-20C5F09A1B01", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*", "matchCriteriaId": "0E2309F8-AFEE-4150-99D1-BA606432ED73", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*", "matchCriteriaId": "7785F282-BFA0-400A-8398-872ACCA4BF37", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1278D3FB-78C6-4F7D-A845-0A93D4F6E2B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "C00A6EFB-A848-46D3-AAD7-FD8140007E42", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "CB6E3972-5C53-4B6D-BFE1-67E1122EA013", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "048617A0-A783-4519-A947-35220D4CD786", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "DD493A41-E686-444C-A34E-412804510F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "87D25FD6-CC3A-4AB0-B7B1-67D07386F99D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C402E9E-09CC-4EFA-AC27-156437B05B22", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C8A41F9C-D2F4-47A9-80CD-2B1BF6B0CB63", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "627FF5B9-E5A8-4DBC-A891-B175011E72A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6146EB2E-BA32-4408-B10B-A711EC39C580", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "1C863324-05AE-4FCA-BD2E-39040A468DCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A85F51E7-0AAE-4F3B-9F90-BD2E31255822", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "315FB0D4-D4A4-4369-BFB8-F2CAEB429015", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "DC74D6C5-F410-4B68-AF92-056B727193A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "B70911F8-A526-4600-8198-03FF4CCB28DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA60A9C9-C2EF-4971-BEFB-FF687DAEF2F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "BAFB22FA-CC24-4AFE-AC83-2D044563F7CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "00F3EB0D-7C63-46B5-BA95-8486B9716C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "00C1BF3B-7593-478D-9AAA-153901C70286", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "82423EC2-FA29-4AF6-86C3-6AC6DFDC4DC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "5F86406A-0936-4A06-88FB-4137A64498EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "672CE4C0-EBD6-470B-937E-810FF1C4CDBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "88DB1105-74D8-4312-9D02-D1E21F2E785C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "404C0557-6229-4D90-BFDD-54AFFCCE6A19", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6D1D26CC-891F-4396-B7D7-30D712829E71", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F25B61EA-F4D1-452A-9D96-B8DFDD719B0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9324AB96-EC99-4F04-A0A9-00F936C86EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "1B8B5E76-4A74-4E88-8A6F-C23538B7642A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "BDB6BBCA-47CE-49B8-9706-AFDE4BE46550", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "8BFF65E2-692B-4C39-88FC-6DED8D9A7258", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "5260E309-9320-4DB8-A918-7D215BF95D2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "60AFF340-A866-4CFE-9334-53B95FD4AA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "74E50309-CD7D-41F7-97DA-A7E451D0796A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "6FD3F8F8-820E-4C29-9F8F-023D1DB999CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "C33A6419-0D00-49D6-9A48-2B633610AAED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "687ED3CE-67C4-410D-8AF4-C769015598F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "30E918CD-89C4-42DA-9709-E50E0A3FA736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "DA57FA15-D0D7-4A97-9C25-6F6566940098", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "A1C45300-A2CF-40E7-AB67-23DC24C31A1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "958081DC-1D77-45CD-A940-C7A1AB42C7BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "298A879D-4F65-4523-A752-D17C4F81B822", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "37AB07BE-54C4-4972-A05F-D1E2CF4363CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBC63564-A84E-463D-8312-DDF1C6B7796F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "62A0906E-B631-4F3A-9ABC-9A43A43220BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "C6314ADA-2849-416D-966E-C01C322EF904", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "8B6CB1DD-614A-4B3D-99AE-9B1341427024", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "CC95B04F-3746-4F1C-8428-A1FA10253E14", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "20819080-E0AB-4879-B4CF-A154D6F7EF6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C6C45753-E2CC-4F7C-B8DA-3D8CF255EA22", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5A080197-D6AA-4FDC-888E-51D1C8251E34", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "1F08D930-D4C1-4C63-875C-171C46AE97C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "1AA43D7D-AEAD-47CB-BFA5-B73004A1A7A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "B5ED5F6F-166D-4610-8939-A33AD45F1ADE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the ast_parse_digest function in main/utils.c in Asterisk 1.8.x before 1.8.10.1 and 10.x before 10.2.1 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string in an HTTP Digest Authentication header." }, { "lang": "es", "value": "Vulnerabilidad de desboramiento de buffer basado en memoria din\u00e1mica en la funci\u00f3n ast_parse_digest en main/utils.c en Asterisk v1.8.x antes de v1.8.10.1 y v10.x antes de v10.2.1, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una cadena larga en una cabecera HTTP Digest Authentication" } ], "id": "CVE-2012-1184", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-09-18T18:55:04.270", "references": [ { "source": "secalert@redhat.com", "url": "http://downloads.asterisk.org/pub/security/AST-2012-003-1.8.diff" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2012-003.pdf" }, { "source": "secalert@redhat.com", "url": "http://osvdb.org/80126" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/48417" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.asterisk.org/node/51797" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/03/16/10" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/03/16/17" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1026813" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74083" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://downloads.asterisk.org/pub/security/AST-2012-003-1.8.diff" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2012-003.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/80126" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/48417" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.asterisk.org/node/51797" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/03/16/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/03/16/17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1026813" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74083" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-02-23 20:30
Modified
2025-04-11 00:51
Severity ?
Summary
The design of the dialplan functionality in Asterisk Open Source 1.2.x, 1.4.x, and 1.6.x; and Asterisk Business Edition B.x.x and C.x.x, when using the ${EXTEN} channel variable and wildcard pattern matches, allows context-dependent attackers to inject strings into the dialplan using metacharacters that are injected when the variable is expanded, as demonstrated using the Dial application to process a crafted SIP INVITE message that adds an unintended outgoing channel leg. NOTE: it could be argued that this is not a vulnerability in Asterisk, but a class of vulnerabilities that can occur in any program that uses this feature without the associated filtering functionality that is already available.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "39358795-09A6-44C6-B969-1560CEF40057", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "8C2DAB51-91ED-43D4-AEA9-7C4661089BAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "A596A018-2FBC-4CEB-9910-756CC6598679", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "14BDCF8E-0B68-430A-A463-EE40C1A9AD65", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "CA2CD93E-71A5-49EC-B986-5868C05553EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "2B66B213-4397-4435-8E48-8ED69AAE13D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "55131A3D-C892-44EC-83D6-5888C57B11A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.2:netsec:*:*:*:*:*:*", "matchCriteriaId": "E017DD53-B8EC-4EA2-BF59-18C075C5771D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B940EEC6-4451-42B9-A56D-BDB8801B3685", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.3:netsec:*:*:*:*:*:*", "matchCriteriaId": "CE4AB19F-1338-466D-AAD8-584C79FED1AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "C619138A-557F-419E-9832-D0FB0E9042C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "B6656EA0-4D4F-4251-A30F-48375C5CE3E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "4AAD9104-BA4A-478F-9B56-195E0F9A7DF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "4F06C361-D7DF-474B-A835-BA8886C11A80", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "175954A5-E712-41B8-BC11-4F999343063D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.10:netsec:*:*:*:*:*:*", "matchCriteriaId": "FF5A2AA3-BB1F-4DEA-A369-183877BBDAC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "1DF9E41E-8FE6-4396-A5D4-D4568600FE03", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.11:netsec:*:*:*:*:*:*", "matchCriteriaId": "7B43C508-91E3-49C9-86F0-3643D8F2B7F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "4457486F-E9B4-46B8-A05D-3B32F8B639A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.12:netsec:*:*:*:*:*:*", "matchCriteriaId": "0831E658-36AB-4A4B-9929-3DB6BE855A3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "69417F54-D92F-46FB-9BFA-995211279C0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.12.1:netsec:*:*:*:*:*:*", "matchCriteriaId": "46A770C7-A7D4-44E3-A8B4-AC2189EAC3DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "4611BEA0-25EC-4705-A390-6DF678373FF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.13:netsec:*:*:*:*:*:*", "matchCriteriaId": "4BCD1F97-4B56-4DA8-A6EC-FA42A3CB9B97", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "53022458-F443-4402-AC52-FC3AE810E89E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "120B85AA-E9B8-4A4D-81CE-FD36CDB63074", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.15:netsec:*:*:*:*:*:*", "matchCriteriaId": "64D94742-7CA1-487B-90E8-5063FBF88925", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "12302460-5D3F-4045-9DBF-606562E03BDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.16:netsec:*:*:*:*:*:*", "matchCriteriaId": "78546FDF-C843-4E48-ABEE-CC3514AA7C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "8D6EBC0B-9842-44D1-B9D6-EFB88BE22879", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.17:netsec:*:*:*:*:*:*", "matchCriteriaId": "052969F1-6758-46E8-9273-E0F872BD65BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "624A0F00-4629-4550-847F-F24CC93DFF2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.18:netsec:*:*:*:*:*:*", "matchCriteriaId": "E473F645-F8B0-43FE-957B-F053427465DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "10FC9AAB-1FAD-4953-A2FC-D42E9687D27E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.19:netsec:*:*:*:*:*:*", "matchCriteriaId": "460C9907-AA19-402A-85DE-D3CEA98B107B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "CD80F0D6-6B5B-41D3-AC41-F1643865088A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.20:netsec:*:*:*:*:*:*", "matchCriteriaId": "734D5198-53C1-40D3-B5BF-D74FC71FD3BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.21:*:*:*:*:*:*:*", "matchCriteriaId": "788DEF5E-8A99-463D-89DC-0CC032271554", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.21:netsec:*:*:*:*:*:*", "matchCriteriaId": "C0996D7A-9419-4897-A0AF-498AC3A2A81F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "62D670E6-47E5-4B40-9217-F97D5F39C3EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.21.1:netsec:*:*:*:*:*:*", "matchCriteriaId": "94C23DB8-3C92-40FE-B8A6-ADF84D28510E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "A6CE7E4E-DA2D-4F03-A226-92965B40AE34", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.22:netsec:*:*:*:*:*:*", "matchCriteriaId": "0C59A947-457E-47EB-832E-3DA70CB52695", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.23:*:*:*:*:*:*:*", "matchCriteriaId": "55F74B56-B412-4AF1-AED0-C948AB6DC829", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.23:netsec:*:*:*:*:*:*", "matchCriteriaId": "3B50ADDB-D3C2-407D-8844-F93866E5F20C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.24:*:*:*:*:*:*:*", "matchCriteriaId": "2775A7CC-2D88-4F2D-8C26-1E0DDDD681E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.24:netsec:*:*:*:*:*:*", "matchCriteriaId": "F4149B59-E773-4ED8-A71D-EB7D00808819", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.25:*:*:*:*:*:*:*", "matchCriteriaId": "5A0408C3-0FA7-4A17-9451-C4D46CDA8F27", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.25:netsec:*:*:*:*:*:*", "matchCriteriaId": "1726090D-0C37-44A4-AD9B-7ED733B8702D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.26:*:*:*:*:*:*:*", "matchCriteriaId": "B92B045B-8CD6-4C04-9CCB-DCE9A44F6C12", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.26:netsec:*:*:*:*:*:*", "matchCriteriaId": "54354E16-3238-43E8-BAA9-93CA7EB44D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.26.1:*:*:*:*:*:*:*", "matchCriteriaId": "6867EED4-FC3B-4B72-88A5-DED96C729FE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.26.1:netsec:*:*:*:*:*:*", "matchCriteriaId": "1A0867FC-7161-433F-A416-D7207C8D4D36", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.26.2:*:*:*:*:*:*:*", "matchCriteriaId": "97BE6B60-3276-4580-843B-743D0D71E3DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.26.2:netsec:*:*:*:*:*:*", "matchCriteriaId": "36491B32-A405-4C5B-938F-9BEA50A8AF16", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.27:*:*:*:*:*:*:*", "matchCriteriaId": "6141909B-EBC4-4726-AE9F-669C31257A5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.28:*:*:*:*:*:*:*", "matchCriteriaId": "754A51AC-EF20-4736-ADDB-D2A70BCB79EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "4600BB66-6DEB-444B-AF9E-BDD06CFD2876", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.29:*:*:*:*:*:*:*", "matchCriteriaId": "EE089E31-3521-4D12-B81C-B6E386AE1409", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "FFE86E95-1110-46DF-9A7A-0E1AA56ACE4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.30.1:*:*:*:*:*:*:*", "matchCriteriaId": "5B6DF5C5-85B4-4595-A69B-1DE70B5E0E41", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.30.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F5E9888-16CD-4DB2-8889-CE4477559C71", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.30.3:*:*:*:*:*:*:*", "matchCriteriaId": "C29C9A2C-6435-444E-A20B-5881F3798B85", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.30.4:*:*:*:*:*:*:*", "matchCriteriaId": "E77A2569-CFAE-498D-A633-803849CFECE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "D16E88E6-42D0-400E-AF43-111B35CE11E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.31.1:*:*:*:*:*:*:*", "matchCriteriaId": "AE15A42E-030B-48F0-9498-1755DAAEDFB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.32:*:*:*:*:*:*:*", "matchCriteriaId": "39511726-1202-4179-9708-4D3B28496768", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.33:*:*:*:*:*:*:*", "matchCriteriaId": "2A9A4328-F274-4591-A386-943FD6608374", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.34:*:*:*:*:*:*:*", "matchCriteriaId": "1B4A8C9A-A475-4F02-A6BC-F17CEECBF0AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.35:*:*:*:*:*:*:*", "matchCriteriaId": "CF11B38A-12D7-453A-870D-CDC2DE9313CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.36:*:*:*:*:*:*:*", "matchCriteriaId": "9D69ACB7-CF9A-40B5-819E-58DA884D4E1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E56DB29-571D-4615-B347-38CF4590E463", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "6F0AC2B3-6E8A-4B26-8A6C-792D9E5072C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "2BC8D6D4-A389-4A78-8DA8-351A9CB896E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "5E979AC4-58EA-4297-9F90-350924BBE440", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "3A58CCD3-4A0C-468B-85F2-59A52B7293A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "3542DB91-8487-49D6-AA15-E8FD9D6B99D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "6BA4F3F1-C3F1-4E15-A854-9BB84E33E4AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "661D710E-79F0-4E98-B35B-ED0549D35C24", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F80CBCB-F58D-4BE7-8E78-67E04C900D01", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "EB61D32E-3400-480E-BD27-BA3F98F94427", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "D9154EDB-CAE6-4BB0-8D02-9EC2B81D93C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "687C67CB-46AF-40C2-8A02-081C7F78568A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "6E8D6EC0-A61E-4DBC-A0C7-864E9C4BDA1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "300F158E-ED27-46C8-85E4-AA0AA6B201DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "FB6F04C0-3226-4D2C-97A3-39999483C62C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "30685A20-963A-48D4-B7D7-2C11C2C812AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "C54C3AAC-4D5D-4661-86AB-6849982E8C67", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "E2EFBC9E-4DCA-43CB-93EB-6807E2383A98", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.18:*:*:*:*:*:*:*", "matchCriteriaId": "98755B1B-CAD5-4AC5-8571-52E67C3A8274", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:*:*:*:*:*:*:*", "matchCriteriaId": "C9D8C8FE-3D09-4F60-AD03-9D4439942141", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:*:*:*:*:*:*:*", "matchCriteriaId": "43F1849F-1230-45E7-B6A3-D6FC72EB0F11", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:*:*:*:*:*:*:*", "matchCriteriaId": "0E6C8F78-0C00-45A5-8FEB-2A4BD5AC1A37", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:*:*:*:*:*:*:*", "matchCriteriaId": "D4333904-9D21-4149-965F-F49F0A34BD85", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:*:*:*:*:*:*:*", "matchCriteriaId": "5B10AE4B-EC2D-4D5B-B842-50F5097A0650", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.24:*:*:*:*:*:*:*", "matchCriteriaId": "DCB18BE2-B073-429C-ABE7-B8305793DAE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.25:*:*:*:*:*:*:*", "matchCriteriaId": "8DBA63FE-62AF-4F3D-B30C-550D17C4E35F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:*:*:*:*:*:*:*", "matchCriteriaId": "E5D425E6-E2E5-4452-9EAA-2697C1155784", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E06848DE-6EE1-4FD0-A14F-39D41B2F3E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B8374B5D-DE7A-4C3C-A5FE-579B17006A54", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "DBFF2686-0F5C-4F20-AA93-6B63C5ADCD82", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B8FE4BCF-9AE7-4F41-BA84-E9537CC1EBE3", "vulnerable": false }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1F8B700A-FACB-4BC8-9DF2-972DC63D852B", "vulnerable": false } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:b.1.3.2:-:business:*:*:*:*:*", "matchCriteriaId": "FE9D66C4-F49D-4EC4-B5A9-24F28726A9B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.1.3.3:-:business:*:*:*:*:*", "matchCriteriaId": "BEFA5054-D5F9-4D07-9A66-D7AAD6953F5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.2.0:-:business:*:*:*:*:*", "matchCriteriaId": "D110DCEB-F2F9-4600-B49F-22952C71B785", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.2.1:-:business:*:*:*:*:*", "matchCriteriaId": "3333A119-D92F-433C-BF5D-0037199256C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.3.1:-:business:*:*:*:*:*", "matchCriteriaId": "19C44C33-EADA-48FD-A634-8066A003AFD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.3.2:-:business:*:*:*:*:*", "matchCriteriaId": "294A2BA2-26EB-40AD-B861-7FA9043CD097", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.3.3:-:business:*:*:*:*:*", "matchCriteriaId": "4FAC61AF-BDF2-4397-A8F8-9D9155836E4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.3.4:-:business:*:*:*:*:*", "matchCriteriaId": "33DE61C2-8C6A-4CD3-8D56-E70C4356CD50", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.3.5:-:business:*:*:*:*:*", "matchCriteriaId": "EECB5F75-BCE2-4777-933E-25EB5657750C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.3.6:-:business:*:*:*:*:*", "matchCriteriaId": "B5D51557-3E67-4C9A-9753-472D13FCA5C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.5.0:-:business:*:*:*:*:*", "matchCriteriaId": "C063FCFA-B1C3-4ACB-B9E7-B3FC973FD898", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.5.1:-:business:*:*:*:*:*", "matchCriteriaId": "761DB3A3-1540-4976-AEB2-F8E45CCCC5E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.5.2:-:business:*:*:*:*:*", "matchCriteriaId": "B53CD2C1-9BF0-42F9-B3E3-2C9915E531C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.5.3:-:business:*:*:*:*:*", "matchCriteriaId": "947F58B8-21AF-460B-8203-D2605A1F91D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.0:beta7:business:*:*:*:*:*", "matchCriteriaId": "1C4E15BB-71AB-4936-9CA7-E844572A3953", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.0:beta8:business:*:*:*:*:*", "matchCriteriaId": "EE5823E1-5BFF-44E0-B8DD-4D994073DC1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.6:-:business:*:*:*:*:*", "matchCriteriaId": "E6C147EF-0C39-4979-A4F6-C0BE288F083F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.6.1:-:business:*:*:*:*:*", "matchCriteriaId": "0C1A8352-DE70-4D4E-BC4D-8EABE5431646", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.6.2:-:business:*:*:*:*:*", "matchCriteriaId": "615D7356-E9DD-4149-B1BE-D3C3475A8841", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.8.0:-:business:*:*:*:*:*", "matchCriteriaId": "0628E34F-1A60-416D-A29C-EA28E8CC2430", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.8.1:-:business:*:*:*:*:*", "matchCriteriaId": "5F54511A-A2A9-4038-9D7D-2283A6709DB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.2.3:-:business:*:*:*:*:*", "matchCriteriaId": "3FA908BA-BEF8-44A5-AC95-E7CF020D0C94", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.0:-:business:*:*:*:*:*", "matchCriteriaId": "78E8936C-033B-49E6-BB39-D5BBBC80EB55", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The design of the dialplan functionality in Asterisk Open Source 1.2.x, 1.4.x, and 1.6.x; and Asterisk Business Edition B.x.x and C.x.x, when using the ${EXTEN} channel variable and wildcard pattern matches, allows context-dependent attackers to inject strings into the dialplan using metacharacters that are injected when the variable is expanded, as demonstrated using the Dial application to process a crafted SIP INVITE message that adds an unintended outgoing channel leg. NOTE: it could be argued that this is not a vulnerability in Asterisk, but a class of vulnerabilities that can occur in any program that uses this feature without the associated filtering functionality that is already available." }, { "lang": "es", "value": "El dise\u00f1o de la funcionalidad dialplan en Asterisk Open Source v1.2.x, v1.4.x, y v1.6.x; y Asterisk Business Edition vB.x.x y vC.x.x,cuando se utiliza la variable de canal $ (EXTEN) y coincidencias de patron comod\u00edn, permite a atacantes dependiendo del contexto, inyectar cadenas en dialplan utilizando metacaracteres que son inyectados cuando la variable es expandida, como se demuestra utilizando la aplicaci\u00f3n Dial en un proceso en el que el mensaje SIP INVITE esta manipulado el cual a\u00f1ade un canal de salida no previsto. NOTA: Podr\u00eda argumentarse que esto no es una vulnerabilidad en Asterisk, pero hay un tipo de vulnerabilidades que pueden producirse en cualquier programa que utilice esta caracter\u00edstica sin la funcionalidad de filtrado correspondiente que actualmente esta disponible." } ], "id": "CVE-2010-0685", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-02-23T20:30:00.780", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://downloads.digium.com/pub/security/AST-2010-002.html" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037679.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38641" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/39096" }, { "source": "cve@mitre.org", "url": "http://svn.asterisk.org/svn/asterisk/branches/1.2/README-SERIOUSLY.bestpractices.txt" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/509608/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1023637" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/0439" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56397" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://downloads.digium.com/pub/security/AST-2010-002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037679.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38641" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/39096" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://svn.asterisk.org/svn/asterisk/branches/1.2/README-SERIOUSLY.bestpractices.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/509608/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1023637" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/0439" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56397" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-09-09 17:55
Modified
2025-04-11 00:51
Severity ?
Summary
The SIP channel driver (channels/chan_sip.c) in Asterisk Open Source 1.8.x before 1.8.23.1, 10.x before 10.12.3, and 11.x before 11.5.1; Certified Asterisk 1.8.15 before 1.8.15-cert3 and 11.2 before 11.2-cert2; and Asterisk Digiumphones 10.x-digiumphones before 10.12.3-digiumphones allows remote attackers to cause a denial of service (NULL pointer dereference, segmentation fault, and daemon crash) via an invalid SDP that defines a media description before the connection description in a SIP request.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "6F368897-A481-42DD-A8B0-8AD43A5FD68B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6BA8F4AF-26C0-4A69-B489-16E7A56E5123", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FE82D53D-092D-4B36-A979-23E9A5E07A78", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "27365383-72DB-4683-9A67-CF553FF2620A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "46EE63D4-CA9C-4DF4-AF85-B8AC2E3F844A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "91407E03-4E98-4DD9-B584-E5BB74F09B9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "669CC22C-45E5-40AB-9A95-D7DFD694B688", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "80A38E0C-45D9-4353-8426-87A4CFA371DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "54A934AE-AB7C-4D10-8BA2-9C54410C648F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "7A7C5A8E-35E6-4B86-8502-1970031AB987", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "1FA4C14B-A01C-4CFE-8985-317ACCDAD209", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "1224686C-8A1E-40E1-ACB9-87F571641EAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "619704FF-2F0C-47E8-A340-58135CEE6B89", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E412E336-871A-4CAC-97E5-FB203BB9349D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.21.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "FC1A0E66-63F4-4BD0-8C9A-3D23A116EE08", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.21.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "79963FF0-5ED6-41B6-8E60-146BD7879518", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "B63FB1C5-9704-4C6A-8DE6-2283D1993BA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.22.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0787BC7B-9464-4AAA-896B-C028ECF8E397", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.22.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "84C0FBC8-9CD1-4135-94C7-BE90A7C94625", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "DE14D16B-4903-47BD-BCBD-28A8B6B878E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "FD3948A1-B5A6-4702-9187-A7720E81B7F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "BC097BB6-02E9-4F48-98CB-B5F31B41009C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "0992625B-012F-40EA-9A20-6352E633F62B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "E3828876-DDB4-457D-8E50-43A4FF761005", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.10.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "79283554-AF08-44DC-BF98-446C47AA490A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "54EBFD0B-686F-477F-8FF2-535F24A3348B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.11.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0961F130-FF8C-41C2-BF2E-9731ED9EB73B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.11.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "BE78F4A2-B165-446C-AA1C-7A9E13718C6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.11.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9789FC49-DE20-4477-B9D5-12CB71F42E58", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "2DD97918-B589-4422-B695-C3C00203A3DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.12.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "A1E59E84-F3FF-44FF-BC7D-31F3880E32F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.12.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "2D9C7006-F5B1-4171-BB44-182C39DE3AAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "C8D2B210-3ADA-40AD-A575-DB88A9F71C91", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F7C53CD-260C-49F5-BCA4-E1D0A58E0B29", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F53B8453-F35A-49BE-8129-774BADF71BA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "CCB0C07E-DA2F-4169-848D-C3315CDC1CB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "410C43E6-5912-4C22-A592-7CF94402EEB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D50A355E-1B55-4DD2-8100-EB81AA6FC40E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "9ADF4230-EFEB-45EC-9C96-0262B4A3E459", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "5234531C-F69A-4B94-A480-147734206C5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "321C1066-6800-4488-A7C4-BE91FF738453", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9B51588-50A2-40B2-A007-06F57D38C7AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CDE2B00C-6AC0-4166-8A25-EFC42CE7F737", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "617FC4AF-D152-4EE1-828D-C2A6AD0DFD3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3A3FE6DC-17FD-4CEE-BDFB-9D4685640381", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8CEEB6C2-0A6D-4434-8446-CB8605CD3B14", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "1548C574-CD51-49F6-91B1-B06C504000E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D56C2C11-4B42-43AB-9DAE-61C15D107160", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "69F2DED4-39F5-44C8-BEA3-22692D28C631", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "AD172E70-238B-4B01-A922-8021B5627092", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "C689A32B-E87D-492F-B3F6-7B80DFA049C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5FB3863D-7F46-4C4A-9E6B-C255CDF0D953", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "7239304D-C383-4F26-BB08-65ADD2380015", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "1AC153C2-258E-4EE6-845F-8E8C68AA242D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "229B7982-9775-42AA-B8F5-FE920CCAA497", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "326845DF-2DB2-406B-BE0F-877384DAACFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.5.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E0FC2D46-FD1B-421F-8773-BB41B1E9A831", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "8788AF7B-CBB6-4D9D-A748-486787935A96", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "CB19B2F7-5685-449F-858C-C226D2A373B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D10B9E8C-3B72-490B-A276-A745299DA3C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E63CF763-0682-4453-8D07-C9253C179486", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "1FDB7AA1-25A7-4BED-A875-C0494E973EA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.11.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "E0BCE319-8C87-4521-BEAA-02F0EF47B315", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.11.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "5A2534F0-3DEE-4FCB-B15D-97D1836CE83D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.11.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "D3F38B78-8215-43D6-8C5C-6DB8E6C34F06", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "CE54B76B-4713-4281-AB4B-B17901121B89", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.12.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "08EE9963-2A44-48A0-8A1B-919CCE3652FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.12.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "19C7B58B-6591-45B5-B527-50FA0A5BD1A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "05D3825F-3B95-4056-AF3C-43269734BA2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk_digiumphones:10.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "806F60DA-FAA1-4C13-889B-0FF518C01E44", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:*:*:*:*:*:*:*", "matchCriteriaId": "E6DDE265-B4B9-495A-95F7-0910E8199980", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1:*:*:*:*:*:*", "matchCriteriaId": "2365F1EE-16A4-4293-B80E-A51CD6A2F112", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1-rc1:*:*:*:*:*:*", "matchCriteriaId": "6B7AE7FB-8170-41AD-9597-07335D36AE48", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1-rc2:*:*:*:*:*:*", "matchCriteriaId": "9131FB32-E3F0-476C-A0D1-36E2101631D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1-rc3:*:*:*:*:*:*", "matchCriteriaId": "5209356B-4A86-4C93-9D04-C66969F23BC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert2:*:*:*:*:*:*", "matchCriteriaId": "F087C546-FBCA-4D0D-A023-8F9384CD160C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:rc1:*:*:*:*:*:*", "matchCriteriaId": "9AF5750B-2348-4E35-9F08-27E2385E329F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C0344FE7-952A-4BC5-A31F-F2C5EABDB5FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.2.0:cert1:*:*:*:*:*:*", "matchCriteriaId": "960521C4-9004-4412-8A38-66240C4B875D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "00F26342-110F-4163-AD11-98AA3B71D299", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "8652FA73-2F02-401C-890F-0544276294D3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SIP channel driver (channels/chan_sip.c) in Asterisk Open Source 1.8.x before 1.8.23.1, 10.x before 10.12.3, and 11.x before 11.5.1; Certified Asterisk 1.8.15 before 1.8.15-cert3 and 11.2 before 11.2-cert2; and Asterisk Digiumphones 10.x-digiumphones before 10.12.3-digiumphones allows remote attackers to cause a denial of service (NULL pointer dereference, segmentation fault, and daemon crash) via an invalid SDP that defines a media description before the connection description in a SIP request." }, { "lang": "es", "value": "El controlador de canal SIP (channels/chan_sip.c) en Asterisk Open Source 1.8.x (anteriores a 1.8.23.1), 10.x (anteriores a 10.12.3), y 11.x (anteriores a 11.5.1); Certified Asterisk 1.8.15 (anteriores a 1.8.15-cert3) y 11.2 (anteriores a 11.2-cert2); y Asterisk Digiumphones 10.x-digiumphones (anteriores a 10.12.3-digiumphones) permiten a un atcante remoto causar una denegaci\u00f3n de servicio (referencia a puntero nulo, corrupci\u00f3n de memoria, y ca\u00edda del demonio) a trav\u00e9s de un SDP inv\u00e1lido que define una descripci\u00f3n de medios antes de la descripci\u00f3n de conexi\u00f3n en una petici\u00f3n SIP." } ], "id": "CVE-2013-5642", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-09-09T17:55:06.267", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2013-08/0174.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2013-005.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/96690" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54534" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/54617" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2013/dsa-2749" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:223" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/62022" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1028957" }, { "source": "cve@mitre.org", "url": "https://issues.asterisk.org/jira/browse/ASTERISK-22007" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2013-08/0174.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2013-005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/96690" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54534" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/54617" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2013/dsa-2749" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:223" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/62022" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1028957" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.asterisk.org/jira/browse/ASTERISK-22007" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-11-30 01:46
Modified
2025-04-09 00:30
Severity ?
Summary
SQL injection vulnerability in the Call Detail Record Postgres logging engine (cdr_pgsql) in Asterisk 1.4.x before 1.4.15, 1.2.x before 1.2.25, B.x before B.2.3.4, and C.x before C.1.0-beta6 allows remote authenticated users to execute arbitrary SQL commands via (1) ANI and (2) DNIS arguments.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B9D3734-ECE5-4A33-AFE2-1EAD07B997A5", "versionEndExcluding": "1.2.25", "versionStartIncluding": "1.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "509EE4B3-B44A-446F-B1B5-476A8BE0F4D6", "versionEndExcluding": "1.4.15", "versionStartIncluding": "1.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:business:*:*:*", "matchCriteriaId": "DEF6C31E-6C5C-4CBA-B6D7-593C1292AF65", "versionEndExcluding": "b.2.3.4", "versionStartIncluding": "b.2.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.0:beta1:*:*:business:*:*:*", "matchCriteriaId": "5B85E573-3A3A-471F-906D-8A262315D0CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.0:beta2:*:*:business:*:*:*", "matchCriteriaId": "65963B39-845B-47D9-A1BD-6ABBA160EF05", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.0:beta3:*:*:business:*:*:*", "matchCriteriaId": "4015BA36-F972-434D-8DA0-4ECE9992275A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.0:beta4:*:*:business:*:*:*", "matchCriteriaId": "587B6E6C-11C5-4721-B0F3-77E77B1C65A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.0:beta5:*:*:business:*:*:*", "matchCriteriaId": "E4160773-6EA9-4339-9DD1-28D4EE591830", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in the Call Detail Record Postgres logging engine (cdr_pgsql) in Asterisk 1.4.x before 1.4.15, 1.2.x before 1.2.25, B.x before B.2.3.4, and C.x before C.1.0-beta6 allows remote authenticated users to execute arbitrary SQL commands via (1) ANI and (2) DNIS arguments." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en el motor de registro Call Detail Record Postgres (cdr_pgsql) de Asterisk 1.4.x anterior a 1.4.15, 1.2.x anterior a 1.2.25, B.x anterior a B.2.3.4, y C.x anterior a C.1.0-beta6 permite a usuarios remotos autenticados ejecutar comandos SQL de su elecci\u00f3n mediante los argumentos (1) ANI y (2) DNIS." } ], "id": "CVE-2007-6170", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-11-30T01:46:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.digium.com/pub/security/AST-2007-026.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/27827" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/27892" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/29242" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/29782" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200804-13.xml" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1019020" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2007/dsa-1417" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/484388/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/26647" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/4056" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38765" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.digium.com/pub/security/AST-2007-026.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/27827" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/27892" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/29242" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/29782" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200804-13.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1019020" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2007/dsa-1417" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/484388/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/26647" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/4056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38765" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-03-15 17:55
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple stack-based and heap-based buffer overflows in the (1) decode_open_type and (2) udptl_rx_packet functions in main/udptl.c in Asterisk Open Source 1.4.x before 1.4.39.2, 1.6.1.x before 1.6.1.22, 1.6.2.x before 1.6.2.16.2, and 1.8 before 1.8.2.4; Business Edition C.x.x before C.3.6.3; AsteriskNOW 1.5; and s800i (Asterisk Appliance), when T.38 support is enabled, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UDPTL packet.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E56DB29-571D-4615-B347-38CF4590E463", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "FC1188DA-6C27-48D2-9CE7-74D77B24EE9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "A93B8F91-5C56-44DE-AE29-8468E853759F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "BF7F4D02-7C8E-403C-A53E-A5F8C07F33A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "D85031A3-3444-4650-905D-721F1EBAA24F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "6F0AC2B3-6E8A-4B26-8A6C-792D9E5072C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "2BC8D6D4-A389-4A78-8DA8-351A9CB896E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "5E979AC4-58EA-4297-9F90-350924BBE440", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "D9154EDB-CAE6-4BB0-8D02-9EC2B81D93C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "A432B0A7-F158-4B9C-97F6-6A29DB13EAFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "687C67CB-46AF-40C2-8A02-081C7F78568A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "6E8D6EC0-A61E-4DBC-A0C7-864E9C4BDA1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EF7F65A-45FD-4586-901E-49B057100BB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "300F158E-ED27-46C8-85E4-AA0AA6B201DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "FB6F04C0-3226-4D2C-97A3-39999483C62C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "30685A20-963A-48D4-B7D7-2C11C2C812AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "C54C3AAC-4D5D-4661-86AB-6849982E8C67", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "6F847916-89F1-4AA6-973D-6002C8B54EE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "5359815E-671A-4DFD-9E99-8CF903A03C84", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "E2EFBC9E-4DCA-43CB-93EB-6807E2383A98", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.18:*:*:*:*:*:*:*", "matchCriteriaId": "98755B1B-CAD5-4AC5-8571-52E67C3A8274", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:*:*:*:*:*:*:*", "matchCriteriaId": "C9D8C8FE-3D09-4F60-AD03-9D4439942141", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc1:*:*:*:*:*:*", "matchCriteriaId": "902FBE4B-5237-43CD-8EB6-D2CAC0F30879", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc2:*:*:*:*:*:*", "matchCriteriaId": "708DCACA-49EC-468D-81EC-CE5367F8A164", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc3:*:*:*:*:*:*", "matchCriteriaId": "BA9E3314-7D23-414C-8187-16D807410B62", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc4:*:*:*:*:*:*", "matchCriteriaId": "D824ED7B-BAB6-4C0F-A6B0-A75AB072EC0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A01CE63-F834-48B2-826D-2DAD1B4AE8C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "88B9CC9D-3DC2-4674-BA52-4C6D4E2056C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:*:*:*:*:*:*:*", "matchCriteriaId": "43F1849F-1230-45E7-B6A3-D6FC72EB0F11", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc1:*:*:*:*:*:*", "matchCriteriaId": "873C9C7E-93A3-4269-B19C-AB33A21C1AC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc2:*:*:*:*:*:*", "matchCriteriaId": "457F2112-7C5E-4953-8F4C-117925D486DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc3:*:*:*:*:*:*", "matchCriteriaId": "BD15ADD6-D7FA-441A-A9BC-487BCC15F2A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "792A8901-B7B8-40E8-9258-6338B72770FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:*:*:*:*:*:*:*", "matchCriteriaId": "0E6C8F78-0C00-45A5-8FEB-2A4BD5AC1A37", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:rc1:*:*:*:*:*:*", "matchCriteriaId": "F3E04247-C4EF-4C1B-B879-5C02986950D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:rc2:*:*:*:*:*:*", "matchCriteriaId": "5E382FC8-4001-4058-9151-05AE98B4A35E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "11FECE6B-B6A6-4DDA-9019-9A10B05EC1F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "D9813D27-0688-4989-99EB-1DC0F82D59F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:*:*:*:*:*:*:*", "matchCriteriaId": "D4333904-9D21-4149-965F-F49F0A34BD85", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc1:*:*:*:*:*:*", "matchCriteriaId": "F7180626-F0FD-46F3-AD52-5C67525C4B46", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc2:*:*:*:*:*:*", "matchCriteriaId": "85A1E3A3-C157-4F3D-9477-F63771E7F627", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc3:*:*:*:*:*:*", "matchCriteriaId": "FEE739CC-7A9C-489E-BFC0-6257129C043D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc4:*:*:*:*:*:*", "matchCriteriaId": "ADC0E947-A95A-44ED-8DED-CC769FF00569", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc5:*:*:*:*:*:*", "matchCriteriaId": "DE52BD9F-3728-455C-BC45-1A4DB926FFE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22.1:*:*:*:*:*:*:*", "matchCriteriaId": "1EF82D41-9222-42D3-ADAD-94B4F950C63F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AE9F181-A8E4-4700-A30F-211CDE251606", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:*:*:*:*:*:*:*", "matchCriteriaId": "5B10AE4B-EC2D-4D5B-B842-50F5097A0650", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc1:*:*:*:*:*:*", "matchCriteriaId": "83E854D0-17A2-473B-B7E8-41E6447C81DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc2:*:*:*:*:*:*", "matchCriteriaId": "47169133-3854-4D8F-B79E-3CC77A166EF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc3:*:*:*:*:*:*", "matchCriteriaId": "6071601F-CF37-4E66-9D6D-AFC3434C18AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc4:*:*:*:*:*:*", "matchCriteriaId": "2A575824-E005-4820-824A-4875594619E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "080C7089-5662-4A94-9842-C4A26095DA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23.2:*:*:*:*:*:*:*", "matchCriteriaId": "7AE38697-0B16-4032-9234-CA263E4A9885", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.24:*:*:*:*:*:*:*", "matchCriteriaId": "DCB18BE2-B073-429C-ABE7-B8305793DAE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.24:rc1:*:*:*:*:*:*", "matchCriteriaId": "FA7216BA-A42F-4ED8-8086-B4FA483FDAB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "CB7D2048-CD61-46C0-830B-11976B275783", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.25:*:*:*:*:*:*:*", "matchCriteriaId": "8DBA63FE-62AF-4F3D-B30C-550D17C4E35F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.25:rc1:*:*:*:*:*:*", "matchCriteriaId": "AD0A0F19-020D-4578-9023-12B0CB646D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.25.1:*:*:*:*:*:*:*", "matchCriteriaId": "96D5A1E3-FF0B-4C71-AA51-655D7106880D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:*:*:*:*:*:*:*", "matchCriteriaId": "E5D425E6-E2E5-4452-9EAA-2697C1155784", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc1:*:*:*:*:*:*", "matchCriteriaId": "9855FA26-0930-4AC9-A920-B394F6916349", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc2:*:*:*:*:*:*", "matchCriteriaId": "BBA21246-7DF4-41BC-998A-05D38FC97C8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc3:*:*:*:*:*:*", "matchCriteriaId": "EE9A7984-22C9-4296-8E44-C010E67F193D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc4:*:*:*:*:*:*", "matchCriteriaId": "51B2C42A-C252-4BD8-A908-8F30C2BF15E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc5:*:*:*:*:*:*", "matchCriteriaId": "2137CEAD-0F19-43C5-A26D-1972564FCD8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc6:*:*:*:*:*:*", "matchCriteriaId": "B7552466-B782-4F16-8561-A2A51E94FED4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26.1:*:*:*:*:*:*:*", "matchCriteriaId": "C2F8C82D-3031-4C62-89FA-3BF56EA29727", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26.2:*:*:*:*:*:*:*", "matchCriteriaId": "B3074CEA-46BD-4CAD-BF5C-10008A80E434", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6AB8988-FCC6-407A-A7D9-2F7A3A7488B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E06848DE-6EE1-4FD0-A14F-39D41B2F3E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc1:*:*:*:*:*:*", "matchCriteriaId": "CF342950-FDD7-41A9-94D5-EDF41130B61E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc2:*:*:*:*:*:*", "matchCriteriaId": "6E4543AA-3D54-4444-AD1F-381A87A89DA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc3:*:*:*:*:*:*", "matchCriteriaId": "AF3036DD-261C-4975-A01E-92CD29479588", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc4:*:*:*:*:*:*", "matchCriteriaId": "EF07C116-27DC-4875-9DCF-049E2A8EAEA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc5:*:*:*:*:*:*", "matchCriteriaId": "88FBC328-538A-4484-A342-1688D9669B9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27.1:*:*:*:*:*:*:*", "matchCriteriaId": "CBF2301E-F6EF-4D28-82EE-FA1AB8CA9E43", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.28:*:*:*:*:*:*:*", "matchCriteriaId": "A53F637C-846A-43FC-BA71-C8571648FA46", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.28:rc1:*:*:*:*:*:*", "matchCriteriaId": "E61070F4-1B6B-4814-918E-459DE5119A24", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.29:*:*:*:*:*:*:*", "matchCriteriaId": "70664E0F-09CF-42C2-A7A7-E635D022E90D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.29:rc1:*:*:*:*:*:*", "matchCriteriaId": "D1E13E1A-C2D4-4E5A-84C8-E6AF061D67C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.29.1:*:*:*:*:*:*:*", "matchCriteriaId": "7E811134-B657-4C50-9AEF-A7F68CA5577A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.30:*:*:*:*:*:*:*", "matchCriteriaId": "4C4CD101-F079-4940-AA79-886B69A7A514", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.30:rc2:*:*:*:*:*:*", "matchCriteriaId": "B7B828E9-5BE3-4E6F-8048-F2B1F2E929CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.30:rc3:*:*:*:*:*:*", "matchCriteriaId": "75BB2066-74A6-4F89-B54C-35F234DC1F03", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.31:*:*:*:*:*:*:*", "matchCriteriaId": "FE522334-BF53-4E34-949B-CD928B59A341", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.31:rc1:*:*:*:*:*:*", "matchCriteriaId": "648DEC0E-3CBC-4EA2-AF27-2C518B0762CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.31:rc2:*:*:*:*:*:*", "matchCriteriaId": "B50F4BAE-D00D-4352-B52B-BE1A9FFB6949", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.32:*:*:*:*:*:*:*", "matchCriteriaId": "E7A35508-8235-4915-8810-12B2630C82C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.32:rc1:*:*:*:*:*:*", "matchCriteriaId": "63DD4EE5-6F56-41C7-9CB4-16ADF4F63B8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.33:*:*:*:*:*:*:*", "matchCriteriaId": "2347E451-2F89-4EA6-A6E0-22BCB0C8A56E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.33:rc1:*:*:*:*:*:*", "matchCriteriaId": "A86F5360-6FE4-4EA2-9208-076E78C842A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.33:rc2:*:*:*:*:*:*", "matchCriteriaId": "3CDFA85B-17A4-4ECC-9922-F5546917B4C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.33.1:*:*:*:*:*:*:*", "matchCriteriaId": "3D7D7DB7-32A7-490E-AED2-C404D371E7C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.34:*:*:*:*:*:*:*", "matchCriteriaId": "A03632BC-CA0F-42BD-8839-A72DB146A4A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.34:rc1:*:*:*:*:*:*", "matchCriteriaId": "9DC4EF64-6A1D-47CB-AC07-48CABB612DCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.34:rc2:*:*:*:*:*:*", "matchCriteriaId": "68C00FEF-7850-48F4-8122-4211D080B508", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.35:*:*:*:*:*:*:*", "matchCriteriaId": "D3A48F07-42E1-47E9-94EA-44D20A0BAC3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.35:rc1:*:*:*:*:*:*", "matchCriteriaId": "87D16470-5892-4289-BB35-B69100BCA31E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.36:*:*:*:*:*:*:*", "matchCriteriaId": "15E71BD7-83D1-4E2B-AD40-BB6B53056C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.36:rc1:*:*:*:*:*:*", "matchCriteriaId": "87FDE2E2-5F08-43EF-BBD8-7DCCC0C98870", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.37:*:*:*:*:*:*:*", "matchCriteriaId": "347E9D8C-A372-41F2-AB48-FFCAB454C9C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.37:rc1:*:*:*:*:*:*", "matchCriteriaId": "74F67E57-1DD0-4850-8D7E-7A9748BD106C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.38:*:*:*:*:*:*:*", "matchCriteriaId": "B208C056-B567-4BEE-A9B7-AEB394341D5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.38:rc1:*:*:*:*:*:*", "matchCriteriaId": "A0C3A2D4-07A9-4D28-AC18-03523E9FF34A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.39:*:*:*:*:*:*:*", "matchCriteriaId": "E6516E0F-9F60-4D20-88D3-B9CD8DC93062", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.39:rc1:*:*:*:*:*:*", "matchCriteriaId": "22147B91-45A4-4834-AC8D-2DC17A706BEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.39.1:*:*:*:*:*:*:*", "matchCriteriaId": "677C10DE-46D8-4EF1-BF22-63F3AE37CBC2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1F8B700A-FACB-4BC8-9DF2-972DC63D852B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FFD31B9B-2F43-4637-BE56-47A807384BF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "E6450D6B-C907-49E6-9788-E4029C09285F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "DDB0432E-024A-4C0C-87FF-448E513D2834", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "D6A6A343-FEA2-49E5-9858-455AE3B29470", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc6:*:*:*:*:*:*", "matchCriteriaId": "D57B94E3-EA37-466C-ADC4-5180D4502FDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc7:*:*:*:*:*:*", "matchCriteriaId": "64D35A89-6B21-4770-AA0F-424C5C91A254", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc8:*:*:*:*:*:*", "matchCriteriaId": "14817302-A34A-4980-B148-AEB4B3B49BE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "61FDFA96-E62A-413B-9846-F51F1F7349EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "DA924386-49F6-4371-B975-B1473EEA12F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "B74A1B99-8901-4690-B994-1DAD3EFA5ABB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "4253C7DD-3588-4B35-B96D-C027133BE93F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "24AE11DB-16D3-42BF-BC64-E8982107D35B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "53841D77-926C-4362-BC85-BD8B6AC4391D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "F98FD6E6-EDE9-437D-B7C2-2DB65B73D230", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "4BA6CA77-D358-4623-8400-78EFC47ADB7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "B4E62DAB-45E0-4EAA-8E45-6D3757A679D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.15:rc1:*:*:*:*:*:*", "matchCriteriaId": "1355578C-B384-401A-9123-2789CBECAD0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "3491F8DB-A162-4608-B5F9-5401FE058CEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16:rc1:*:*:*:*:*:*", "matchCriteriaId": "C52730A8-D96E-46C1-8905-1D78A93E9C84", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "C6E5CD17-B14A-4BDB-BA75-261344FF6F25", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6344E43-E8AA-4340-B3A7-72F5D6A5D184", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "4C170C1C-909D-4439-91B5-DB1A9CD150C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EE821BE5-B1D3-4854-A700-3A83E5F15724", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "149C57CA-0B4B-4220-87FC-432418D1C393", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "035595D5-BBEC-4D85-AD7A-A2C932D2BA70", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "6DAF5655-F09F-47F8-AFA6-4B95F77A57F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F8E001D8-0A7B-4FDD-88E3-E124ED32B81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9D5CFFBD-785F-4417-A54A-F3565FD6E736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "D30EF999-92D1-4B19-8E32-1E4B35DE4EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "A67D156B-9C43-444F-ADEC-B21D99D1433C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "893EB152-6444-43DB-8714-9735354C873A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8447EE7-A834-41D7-9204-07BD3752870C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C04F2C9-5672-42F2-B664-A3EE4C954C29", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "33465668-4C91-4619-960A-D26D77853E53", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "CAD08674-0B44-44EA-940B-6812E2D5077D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "EEE87710-A129-43AA-BA08-8001848975FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F582C6E-5DA0-4D72-A40E-66BDBC5CF2B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CEBB8-01B3-4A05-AFE8-37A143C9833E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:c.1.0:beta7:business:*:*:*:*:*", "matchCriteriaId": "1C4E15BB-71AB-4936-9CA7-E844572A3953", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.0:beta8:business:*:*:*:*:*", "matchCriteriaId": "EE5823E1-5BFF-44E0-B8DD-4D994073DC1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.6:-:business:*:*:*:*:*", "matchCriteriaId": "E6C147EF-0C39-4979-A4F6-C0BE288F083F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.6.1:-:business:*:*:*:*:*", "matchCriteriaId": "0C1A8352-DE70-4D4E-BC4D-8EABE5431646", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.6.2:-:business:*:*:*:*:*", "matchCriteriaId": "615D7356-E9DD-4149-B1BE-D3C3475A8841", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.8.0:-:business:*:*:*:*:*", "matchCriteriaId": "0628E34F-1A60-416D-A29C-EA28E8CC2430", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.8.1:-:business:*:*:*:*:*", "matchCriteriaId": "5F54511A-A2A9-4038-9D7D-2283A6709DB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.2.3:-:business:*:*:*:*:*", "matchCriteriaId": "3FA908BA-BEF8-44A5-AC95-E7CF020D0C94", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.0:-:business:*:*:*:*:*", "matchCriteriaId": "78E8936C-033B-49E6-BB39-D5BBBC80EB55", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.1.0:-:business:*:*:*:*:*", "matchCriteriaId": "5D05D04F-CD6C-4A73-885C-306D7A5CC7C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.1.1:-:business:*:*:*:*:*", "matchCriteriaId": "3805B5F3-A4CD-469F-9F8A-A271A79A2B7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.2.2:-:business:*:*:*:*:*", "matchCriteriaId": "9FAEBE5E-378A-40DC-B2B9-31F6D1305BCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.2.3:-:business:*:*:*:*:*", "matchCriteriaId": "617B3FE8-39E3-41C0-9348-9507DA43DE93", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.3.2:-:business:*:*:*:*:*", "matchCriteriaId": "04AB4C82-71BB-49B7-B4F3-4E75EFB5F1A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.6.2:-:business:*:*:*:*:*", "matchCriteriaId": "78B55176-E269-411B-974A-B5D2CE8E08C2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisknow:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "FF81215F-0DD3-48FC-BA1C-19E42FCD47B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:digium:s800i:*:*:*:*:*:*:*:*", "matchCriteriaId": "E063F5CE-AAF1-4FB0-9D75-E26F30B85409", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B8FE4BCF-9AE7-4F41-BA84-E9537CC1EBE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F25B0D15-7C09-4BBB-AC84-A1898F448DB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F259057F-3720-45D8-91B4-70A11B759794", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "A106C460-4CE2-4AC3-B2FD-310F05507511", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "3E119FF9-2AD3-450D-8BBF-C6DD063246EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "759221D5-FC37-446D-9628-233B8D0B9120", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F82D4812-0429-42D4-BD27-C76CB9E7C368", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8FE11D6-8C0A-450E-B6DA-3AFE04D82232", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "5D1FBCC8-4637-4A67-BFFD-C052C3C03C12", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "F7307E10-9FA5-4940-B837-7936384F61DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "3D0DC9D6-D4D6-46CB-98DA-F4FC1835B6B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBBD0747-F3FF-46D8-A3C4-8268E37BC5AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.7:rc1:*:*:*:*:*:*", "matchCriteriaId": "3F759F27-008E-47FB-AC0A-EF11DA19918E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.7:rc2:*:*:*:*:*:*", "matchCriteriaId": "D15C82BA-BD1F-4A19-A907-E6C30042F537", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "2E802481-C8BD-4218-8CDC-5DB112DA946C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "D6FC8A53-E3C0-4660-BE75-2B5B8B4F8160", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "93C020CD-D0EA-4B3E-B33C-F900B08B28FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:rc1:*:*:*:*:*:*", "matchCriteriaId": "0004AADE-1652-4242-A97D-E9818FE03CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:rc2:*:*:*:*:*:*", "matchCriteriaId": "543E9C91-60FE-43AE-9B94-08DD730BA814", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:rc3:*:*:*:*:*:*", "matchCriteriaId": "252849FA-F46E-4F5A-A488-AA53574CA884", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "9EB89B4F-9546-4DF0-B69F-1B9F289BB1E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "2E254415-1D59-4A77-80FB-AE3EF10FBB32", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.12:rc1:*:*:*:*:*:*", "matchCriteriaId": "DF2407D0-C324-45C4-9FBB-4294F747DBDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "F23A36CC-9AA2-4559-946D-6D0621664342", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.13:rc1:*:*:*:*:*:*", "matchCriteriaId": "89C40652-E180-416A-B88A-E6313530E98A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "A28C2C5D-A573-4036-A600-BE28A3E417B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.15:rc2:*:*:*:*:*:*", "matchCriteriaId": "EE162390-359F-4C5D-902B-275FB1FC3EF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "4A0A3750-0D34-4FB5-B897-17CA0D0B7CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "D11BE58D-5B7E-4BB5-988A-7FC2E4B92C4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "22631AE6-5DA1-46C6-A239-C232DA0D0E7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.18:rc1:*:*:*:*:*:*", "matchCriteriaId": "9F5CB8CC-4CC1-4A1B-8AD1-C876D1BC80EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.18:rc2:*:*:*:*:*:*", "matchCriteriaId": "8591DB43-EAA0-4D58-BA23-EAD916DEA3DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "4E4747F8-1AFC-4AEF-82D8-D6604FB5222E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.19:rc1:*:*:*:*:*:*", "matchCriteriaId": "B82172C9-EA5B-4FC9-A445-0A297AE56FF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.19:rc2:*:*:*:*:*:*", "matchCriteriaId": "0C71CDAB-A299-4F1D-942D-851C899E63BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.19:rc3:*:*:*:*:*:*", "matchCriteriaId": "E2FA9AB9-4C83-45A3-9772-3A16030DBF1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "A88C639A-9229-4D99-9087-1B0B95539BD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.20:rc1:*:*:*:*:*:*", "matchCriteriaId": "0B7DE987-7351-495A-8776-37E6B7BF0C0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.20:rc2:*:*:*:*:*:*", "matchCriteriaId": "CB5823CC-941F-47AB-AD1F-325181D40E60", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "712AF374-846D-4F21-91C4-1BA9AB33E46D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple stack-based and heap-based buffer overflows in the (1) decode_open_type and (2) udptl_rx_packet functions in main/udptl.c in Asterisk Open Source 1.4.x before 1.4.39.2, 1.6.1.x before 1.6.1.22, 1.6.2.x before 1.6.2.16.2, and 1.8 before 1.8.2.4; Business Edition C.x.x before C.3.6.3; AsteriskNOW 1.5; and s800i (Asterisk Appliance), when T.38 support is enabled, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UDPTL packet." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer en las funciones (1) decode_open_type y (2) udptl_rx_packet en main/udptl.c en Asterisk Open Source v1.4.x anterior a v1.4.39.2, v1.6.1.x antes de v1.6.1.22, v1.6.2.x antes de v1.6.2.16.2, y v1.8 antes de v1.8.2.4; Business Edition vC.x.x antes de vC.3.6.3; AsteriskNOW v1.5; y s800i (Asterisk Appliance), cuando el soporte T.38 est\u00e1 activo, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un paquete UDPTL manipulado" } ], "id": "CVE-2011-1147", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-03-15T17:55:05.953", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2011-002.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055030.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055421.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055634.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43429" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43702" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2011/dsa-2225" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2011/03/11/2" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2011/03/11/8" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/46474" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1025101" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0635" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2011-002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055030.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055421.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055634.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43429" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43702" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2225" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2011/03/11/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2011/03/11/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46474" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0635" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-04-18 22:14
Modified
2025-04-12 10:46
Severity ?
Summary
channels/chan_sip.c in Asterisk Open Source 1.8.x before 1.8.26.1, 11.8.x before 11.8.1, and 12.1.x before 12.1.1, and Certified Asterisk 1.8.15 before 1.8.15-cert5 and 11.6 before 11.6-cert2, when chan_sip has a certain configuration, allows remote authenticated users to cause a denial of service (channel and file descriptor consumption) via an INVITE request with a (1) Session-Expires or (2) Min-SE header with a malformed or invalid value.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "93F2B062-09B4-44F1-87E4-6104B757B557", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "F2877B09-B0B9-4AD4-906A-D40E25DDC4BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "11AAE0EA-D7EB-4341-A412-FBCDC99565A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "37F93124-25D9-44ED-B4AB-1B3552FCAB09", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "E4CB22F6-9F63-427C-B2D2-7ABB9B4F7694", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "758AB27B-7C40-41ED-9FC3-BE3D682EE48A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "07D3186A-CD6F-432A-8653-4CFBA37B9864", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "746FB2E6-EF66-4EF3-946C-111FB7728EBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "91D933DB-06F7-45A4-A517-BFAEC82DDB7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "3AAB500F-8F0D-4534-B659-C495D1799913", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "5F5C5156-CC72-4AB5-A927-E874199EBD8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.1.0:-:*:*:*:*:*:*", "matchCriteriaId": "AB912D4D-6BA4-4AEF-BBFD-EABFED240015", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "68C78C16-3807-4272-9B46-9D9AF5150879", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.2.0:-:*:*:*:*:*:*", "matchCriteriaId": "02E13D3A-B37B-4215-82E0-3FCE5E35B00A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "BE0F93D1-7602-47AC-9ACE-AA850D7DFD23", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.3.0:-:*:*:*:*:*:*", "matchCriteriaId": "956BCED3-1818-4673-A0F4-E7F03F366D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0B58ACCC-0255-46B1-8517-EDCD85AA0F35", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "A921B590-57C2-4E0A-B28B-D0E48F5E1B58", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.3.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "70F0AE7B-9E53-4E3B-AA9E-EAF7C4C31E1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.4.0:-:*:*:*:*:*:*", "matchCriteriaId": "5DE6F187-7236-4622-BD62-1E5F0742B41B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "F70DDB6D-BE16-4375-87AE-E5E2B5862D17", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.4.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6910E07C-3ACA-414F-B468-13E4BF9BE938", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.4.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "837A07D7-C2FD-4077-A0AD-AF2147E04B84", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.5.0:-:*:*:*:*:*:*", "matchCriteriaId": "B2A99209-E8C5-44E6-A8DA-7FC07FBA6D87", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "18985B4A-4C54-4EC6-9274-15E7DCFEC94D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.6.0:-:*:*:*:*:*:*", "matchCriteriaId": "48AE70AD-85BE-44DE-BC75-1690C27821B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "804F861A-81E1-45C5-A7D3-0E73770AC155", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "0AE503BD-F9BD-4396-B27D-184AE06F594D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9CD9A213-27F7-410E-97B1-E7405B4FCECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.7.0:-:*:*:*:*:*:*", "matchCriteriaId": "10FFDE4F-0B30-43C3-9475-80259D5E9055", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5F30E2AB-B354-4583-9D76-9DF1727407A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "DBDFE57E-EEBF-4722-B6D0-147F72018DE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.8.0:-:*:*:*:*:*:*", "matchCriteriaId": "902A2600-49A7-4013-A621-9EE94F1E8435", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7021D54A-D443-492A-AE8C-62F2B85A1F37", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "B003CB5A-A95A-481F-B762-79C476829D81", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "84C8BB88-FBE3-4C82-9D53-E34AA7B6A73E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "F8037EB0-42FA-45BA-9E8E-D279432EC4CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "E374559C-E550-4BB9-9682-9C4535EAE9A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.9.0:-:*:*:*:*:*:*", "matchCriteriaId": "FFFB7E8B-C963-4ACB-AE37-9E4938A5462E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "DF83EAD3-3CC1-4C1B-AAB8-0FE03BB67EC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.9.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E3F75AF0-A4E0-425E-B707-ED1F58C9CC83", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.9.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "745EC4D8-5E19-48C8-8609-11A74DC18266", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.10.0:-:*:*:*:*:*:*", "matchCriteriaId": "F1871DC4-AA58-4C04-9D6A-4FF383C56405", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8560DBD-A70E-4033-AE2E-96DA373AB425", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.10.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E08ECE50-3A53-45C1-8BEA-8B9E024E22F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.10.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "59C2E58B-EEB3-4E8D-940C-2DF846923B19", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.10.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "D40F2ADC-6F79-410F-9063-1354C15F0D8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11.0:-:*:*:*:*:*:*", "matchCriteriaId": "69E55195-84CC-46DB-9E49-DEB864DF0659", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7F58B52D-9510-465F-8BFB-6896B4D36F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "59E72AD4-90BE-4C3B-B457-31FF193712FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "81EB266E-40BC-45EA-8EDB-4766011C460B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.12.0:-:*:*:*:*:*:*", "matchCriteriaId": "E23FCBC3-30EF-47BC-AEFE-073E84B6DBA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.12.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5AB33EDF-29D7-4092-91FE-505B39D3E57B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.12.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "4F698874-028E-410B-90FE-FDD441F55C32", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.12.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "081DA344-7266-4D67-8B92-830F43B42CC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.13.0:-:*:*:*:*:*:*", "matchCriteriaId": "01851B4A-F7CB-4263-B06C-92D39A693530", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.13.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6BB95638-D09F-4F02-9076-49BE93F2A407", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.13.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6E2DD3AF-EF01-4A1A-AF9A-98575E36D088", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.14.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "163E8F93-432A-4F68-B309-7A38AE1A30FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.14.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F53C384F-75DD-4A29-8907-BA95F08B1465", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:-:*:*:*:*:*:*", "matchCriteriaId": "6BB940E4-E612-4B27-9188-E794665191B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1:*:*:*:*:*:*", "matchCriteriaId": "2365F1EE-16A4-4293-B80E-A51CD6A2F112", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1_rc1:*:*:*:*:*:*", "matchCriteriaId": "6952FFDE-92D0-4A75-AABB-113E6FAF5A31", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1_rc2:*:*:*:*:*:*", "matchCriteriaId": "5735354A-CF57-4A9A-9607-169CE50E0655", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1_rc3:*:*:*:*:*:*", "matchCriteriaId": "38E0B2C4-55EA-4712-8E75-24A5718F9FD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert2:*:*:*:*:*:*", "matchCriteriaId": "F087C546-FBCA-4D0D-A023-8F9384CD160C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert3:*:*:*:*:*:*", "matchCriteriaId": "832F5503-6354-4E39-B927-3BA9606A372D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert4:*:*:*:*:*:*", "matchCriteriaId": "9E23AF8A-63B2-4597-8E78-A4672B0C44B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:*:*:*:*", "matchCriteriaId": "322694EF-B086-4BE7-A9F0-41D3A9C245FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc1:*:*:*:*:*:*", "matchCriteriaId": "781AC882-80DD-4176-8E4F-220343B15F68", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc2:*:*:*:*:*:*", "matchCriteriaId": "770CCEEA-B121-454B-BD36-3FC1B262998A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6.0:-:*:*:*:*:*:*", "matchCriteriaId": "CCDDF5C2-9B45-4811-90F6-984EF4B220CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "56849E34-B192-46A8-A517-C7C184A901B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "4610D544-156F-4E9A-BC46-9E0FF8D5D641", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6344E43-E8AA-4340-B3A7-72F5D6A5D184", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "4C170C1C-909D-4439-91B5-DB1A9CD150C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EE821BE5-B1D3-4854-A700-3A83E5F15724", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "149C57CA-0B4B-4220-87FC-432418D1C393", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "035595D5-BBEC-4D85-AD7A-A2C932D2BA70", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "6DAF5655-F09F-47F8-AFA6-4B95F77A57F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F8E001D8-0A7B-4FDD-88E3-E124ED32B81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9D5CFFBD-785F-4417-A54A-F3565FD6E736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "D30EF999-92D1-4B19-8E32-1E4B35DE4EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "A67D156B-9C43-444F-ADEC-B21D99D1433C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "893EB152-6444-43DB-8714-9735354C873A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8447EE7-A834-41D7-9204-07BD3752870C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C04F2C9-5672-42F2-B664-A3EE4C954C29", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "33465668-4C91-4619-960A-D26D77853E53", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "CAD08674-0B44-44EA-940B-6812E2D5077D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "EEE87710-A129-43AA-BA08-8001848975FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F582C6E-5DA0-4D72-A40E-66BDBC5CF2B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CEBB8-01B3-4A05-AFE8-37A143C9833E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "522733A7-E89E-4BFD-AC93-D6882636E880", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "2FAC47DD-B613-43E4-B9BF-6120B81D9789", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "86D20CB5-60E8-405E-B387-CF80C7DA5E07", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "71AB5A01-5961-4053-9111-CF32C6473A00", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*", "matchCriteriaId": "77D8E1DC-041F-4B87-AF9A-E0EC4D6A4BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7CCCB892-30CE-4BEF-904E-5D957F94D0EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "F156798F-F2EF-4366-B17E-03165AB437D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "9EFBB9A6-DD1D-436E-919F-74A3E4F40396", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "054E34C8-B6A5-48C7-938E-D3C268E0E8BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*", "matchCriteriaId": "1DCECA72-533A-4A95-AB19-20C5F09A1B01", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*", "matchCriteriaId": "0E2309F8-AFEE-4150-99D1-BA606432ED73", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*", "matchCriteriaId": "7785F282-BFA0-400A-8398-872ACCA4BF37", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1278D3FB-78C6-4F7D-A845-0A93D4F6E2B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "C00A6EFB-A848-46D3-AAD7-FD8140007E42", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "CB6E3972-5C53-4B6D-BFE1-67E1122EA013", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "048617A0-A783-4519-A947-35220D4CD786", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "DD493A41-E686-444C-A34E-412804510F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "87D25FD6-CC3A-4AB0-B7B1-67D07386F99D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C402E9E-09CC-4EFA-AC27-156437B05B22", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C8A41F9C-D2F4-47A9-80CD-2B1BF6B0CB63", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "627FF5B9-E5A8-4DBC-A891-B175011E72A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6146EB2E-BA32-4408-B10B-A711EC39C580", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "1C863324-05AE-4FCA-BD2E-39040A468DCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A85F51E7-0AAE-4F3B-9F90-BD2E31255822", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "315FB0D4-D4A4-4369-BFB8-F2CAEB429015", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "DC74D6C5-F410-4B68-AF92-056B727193A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "B70911F8-A526-4600-8198-03FF4CCB28DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA60A9C9-C2EF-4971-BEFB-FF687DAEF2F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:-:*:*:*:*:*:*", "matchCriteriaId": "984CD6D9-4A54-4065-8401-DC555AB95425", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:patch:*:*:*:*:*:*", "matchCriteriaId": "CDE13439-4124-4BDE-A068-460BCF96419B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "BAFB22FA-CC24-4AFE-AC83-2D044563F7CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "00F3EB0D-7C63-46B5-BA95-8486B9716C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "00C1BF3B-7593-478D-9AAA-153901C70286", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "82423EC2-FA29-4AF6-86C3-6AC6DFDC4DC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "5F86406A-0936-4A06-88FB-4137A64498EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "672CE4C0-EBD6-470B-937E-810FF1C4CDBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "88DB1105-74D8-4312-9D02-D1E21F2E785C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "404C0557-6229-4D90-BFDD-54AFFCCE6A19", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:-:*:*:*:*:*:*", "matchCriteriaId": "3F4DC562-649E-4105-8B3E-43F02BD593FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6D1D26CC-891F-4396-B7D7-30D712829E71", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F25B61EA-F4D1-452A-9D96-B8DFDD719B0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9324AB96-EC99-4F04-A0A9-00F936C86EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "1B8B5E76-4A74-4E88-8A6F-C23538B7642A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "BDB6BBCA-47CE-49B8-9706-AFDE4BE46550", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "8BFF65E2-692B-4C39-88FC-6DED8D9A7258", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "5260E309-9320-4DB8-A918-7D215BF95D2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:-:*:*:*:*:*:*", "matchCriteriaId": "58F4BFC9-E02A-4121-8D34-99022AB8B45A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "60AFF340-A866-4CFE-9334-53B95FD4AA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "74E50309-CD7D-41F7-97DA-A7E451D0796A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "6FD3F8F8-820E-4C29-9F8F-023D1DB999CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "C33A6419-0D00-49D6-9A48-2B633610AAED", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "447E07C9-4A25-418D-B53F-609B78EE4C21", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E8AE686-B618-4B0D-BD27-1F96295E964D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:-:*:*:*:*:*:*", "matchCriteriaId": "9C806F87-C897-48E4-8533-A4EBC6B77078", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:patch:*:*:*:*:*:*", "matchCriteriaId": "08B8C143-93FF-44DD-8F61-6F4FEE977371", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E9751C0A-84F5-4A43-8282-12A9DE559569", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F67E2694-F6F1-482C-91F2-D9FD856EA31B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "5E2D53AA-8D50-445F-9500-2F580F260DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.1:-:*:*:*:*:*:*", "matchCriteriaId": "8859F234-5066-40DD-862C-0F3CCA98AFB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.1:patch:*:*:*:*:*:*", "matchCriteriaId": "75962F03-EC19-4920-9FA7-2D422E6E83F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12:*:*:*:*:*:*:*", "matchCriteriaId": "8D9D7D88-D64F-4F54-8C84-6AC45FBD36F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "F67AB282-591C-4ED7-9750-C593A38D5D7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:-:*:*:*:*:*:*", "matchCriteriaId": "B5D0BB0E-1BB0-4F31-9C5D-DC1A069E52DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "C9F8F881-2BF7-44AB-8756-54A06801EB11", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "36EFF3C4-4D00-4BC5-94B9-403BB00C6AB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "5E434F10-395E-426E-A988-4CDA504577D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "33FE3DCE-74B5-49A4-BC18-34B22CA83947", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "FF2E25F3-053D-4F7D-A35D-706A401CCAA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "8880AE7C-3E44-4B76-B500-E93868D4CF5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7C94269D-A271-42AC-A44C-102C814E564B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E7E5B826-D3D5-4D2D-BB4D-2C1BEDE92456", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "5BA564F7-7A69-4805-8C8C-C2EB5E12A6E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.0:-:*:*:*:*:*:*", "matchCriteriaId": "2A153336-10C4-4C42-AC66-AC1351887EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.0:patch:*:*:*:*:*:*", "matchCriteriaId": "0C2FF4E9-2513-4022-AF80-6F44A2287D6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "DF6FA464-F9D3-4674-844B-A2B2E2C42A51", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "44722C8B-BB37-4444-A58A-F01D0B3B4DDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "C4FABFDB-D99A-4F83-8FEE-3BFA36BA4061", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.1:-:*:*:*:*:*:*", "matchCriteriaId": "43E00618-19F6-4828-818A-95C9106097B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.1:patch:*:*:*:*:*:*", "matchCriteriaId": "CEC4F4AE-7BD8-437F-8838-FE564BCB7FA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "A842E112-8974-4E74-AD56-1DEF5B5DD9F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.15.0:-:*:*:*:*:*:*", "matchCriteriaId": "2BC3B463-6B2C-42AF-BE13-50B7D63E7F05", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.15.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D9ACBC01-8A9D-43A5-A825-1CC9670417A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "61E7199F-EACE-431A-8ADD-B96A6FCDBC49", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA7CD0E5-8E69-43B5-A5FF-8B122475CC00", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.16.0:-:*:*:*:*:*:*", "matchCriteriaId": "2799111C-06DB-4979-8F81-A8C09D53E5F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.16.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "F4BEA1B2-2103-4E25-92A9-DB107D6D4AD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.16.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "2AD9AFFB-F903-43DD-9C1D-4D8E83EA25C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "6F368897-A481-42DD-A8B0-8AD43A5FD68B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:-:*:*:*:*:*:*", "matchCriteriaId": "4F3C35F1-CBF2-4F77-AC19-574DEF2652A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:patch:*:*:*:*:*:*", "matchCriteriaId": "75EA94FD-D16A-49BC-A418-36EFC187EC7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6BA8F4AF-26C0-4A69-B489-16E7A56E5123", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FE82D53D-092D-4B36-A979-23E9A5E07A78", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "27365383-72DB-4683-9A67-CF553FF2620A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "46EE63D4-CA9C-4DF4-AF85-B8AC2E3F844A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.0:-:*:*:*:*:*:*", "matchCriteriaId": "A14FC2A1-29D5-49FE-92A9-D61833BF1C95", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "91407E03-4E98-4DD9-B584-E5BB74F09B9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "669CC22C-45E5-40AB-9A95-D7DFD694B688", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "80A38E0C-45D9-4353-8426-87A4CFA371DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:-:*:*:*:*:*:*", "matchCriteriaId": "5E3C5C1E-67E9-401A-BA52-FCB32CA4473C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "54A934AE-AB7C-4D10-8BA2-9C54410C648F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "7A7C5A8E-35E6-4B86-8502-1970031AB987", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "1FA4C14B-A01C-4CFE-8985-317ACCDAD209", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:-:*:*:*:*:*:*", "matchCriteriaId": "501F5764-BBC2-426A-AF01-7FB477850073", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:patch:*:*:*:*:*:*", "matchCriteriaId": "FDB35CE5-4EDB-4949-A5E4-1BD721CCA469", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "619704FF-2F0C-47E8-A340-58135CEE6B89", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E412E336-871A-4CAC-97E5-FB203BB9349D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.1:-:*:*:*:*:*:*", "matchCriteriaId": "82ED9CD2-504E-4D7B-B242-2511A7730776", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.1:patch:*:*:*:*:*:*", "matchCriteriaId": "EF6E50F5-605A-4D2B-B55D-8AB251532E8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.2:-:*:*:*:*:*:*", "matchCriteriaId": "F6C796AE-95EE-4EAB-959C-1C1353C565A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.2:patch:*:*:*:*:*:*", "matchCriteriaId": "EEAF3B2E-E520-4F43-ACC5-0F01A6247199", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.21.0:-:*:*:*:*:*:*", "matchCriteriaId": "085D4102-E2E8-496C-85B7-714FD3639BE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.21.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "FC1A0E66-63F4-4BD0-8C9A-3D23A116EE08", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.21.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "79963FF0-5ED6-41B6-8E60-146BD7879518", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.22.0:-:*:*:*:*:*:*", "matchCriteriaId": "E0ABBB2C-19EC-4D6C-A1EA-AEF0ABA4123D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.22.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0787BC7B-9464-4AAA-896B-C028ECF8E397", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.22.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "84C0FBC8-9CD1-4135-94C7-BE90A7C94625", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:-:*:*:*:*:*:*", "matchCriteriaId": "981F3994-392D-47DB-97DA-AC15BA070A36", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:patch:*:*:*:*:*:*", "matchCriteriaId": "94691EE6-266F-46CE-B388-0289EB39D91A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "FD3948A1-B5A6-4702-9187-A7720E81B7F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "BC097BB6-02E9-4F48-98CB-B5F31B41009C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C2FD962-B1D5-41E5-884E-0C3F7F9DACE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.24.0:-:*:*:*:*:*:*", "matchCriteriaId": "096E966A-878B-426F-AB40-BB476B17B969", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.24.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "852DAF2A-86F3-4D05-91DC-6A2FBC214736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.24.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "7D721486-3043-4380-A73C-44B4DD0E34C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "1F29E2EE-B6E8-4E55-84A8-3BD0658387EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.25.0:-:*:*:*:*:*:*", "matchCriteriaId": "837BF2BD-814F-4503-91DF-EE16B5A4921D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.25.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "15FCDDB3-62D8-446C-B57C-F3BBFBD13491", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.25.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "03512BDE-E441-46F6-88B7-16A2468CA199", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.26.0:-:*:*:*:*:*:*", "matchCriteriaId": "902CAF9D-9D02-47FA-AE2E-EC1268A32BA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.26.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "80AD87B5-B796-4C44-8A6D-0B22AA2903CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:-:*:*:*:*:*:*", "matchCriteriaId": "03298D9F-CFB8-48F9-BD0C-8A0BEB0760C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "87FCBE6A-C1CD-48EF-A435-4CEADD46C917", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "42E0E639-70A2-41EE-9B34-A9223D1958AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "32E84D64-0CB8-46BF-BD3F-8CA2E0CE4C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:-:*:*:*:*:*:*", "matchCriteriaId": "F3DE062D-4E87-4691-A664-D9E7C02036EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3B4D6D24-A718-4962-AD4E-F19AFB03BFF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "BE2F0D0D-761C-4338-93F0-506E94E57000", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "3D38DFCA-E357-4A28-8F03-FDADF40A5185", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*", "matchCriteriaId": "5991814D-CA77-4C25-90D2-DB542B17E0AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "matchCriteriaId": "FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "channels/chan_sip.c in Asterisk Open Source 1.8.x before 1.8.26.1, 11.8.x before 11.8.1, and 12.1.x before 12.1.1, and Certified Asterisk 1.8.15 before 1.8.15-cert5 and 11.6 before 11.6-cert2, when chan_sip has a certain configuration, allows remote authenticated users to cause a denial of service (channel and file descriptor consumption) via an INVITE request with a (1) Session-Expires or (2) Min-SE header with a malformed or invalid value." }, { "lang": "es", "value": "channels/chan_sip.c en Asterisk Open Source 1.8.x anterior a 1.8.26.1, 11.8.x anterior a 11.8.1 y 12.1.x anterior a 12.1.1, y Certified Asterisk 1.8.15 anterior a 1.8.15-cert5 y 11.6 anterior a 11.6-cert2, cuando chan_sip tiene cierta configuraci\u00f3n, permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (consumo de canal y consumo de descriptores de archivo) a trav\u00e9s de una solicitud INVITE con una cabecera (1) Session-Expires o (2) Min-SE con un valor malformado o invalido." } ], "id": "CVE-2014-2287", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-04-18T22:14:38.010", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-002-1.8.diff" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-002.html" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130400.html" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130426.html" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:078" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/66094" }, { "source": "cve@mitre.org", "url": "https://issues.asterisk.org/jira/browse/ASTERISK-23373" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-002-1.8.diff" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130400.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130426.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:078" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/66094" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.asterisk.org/jira/browse/ASTERISK-23373" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-12-02 00:29
Modified
2025-04-20 01:37
Severity ?
Summary
An issue was discovered in chan_skinny.c in Asterisk Open Source 13.18.2 and older, 14.7.2 and older, and 15.1.2 and older, and Certified Asterisk 13.13-cert7 and older. If the chan_skinny (aka SCCP protocol) channel driver is flooded with certain requests, it can cause the asterisk process to use excessive amounts of virtual memory, eventually causing asterisk to stop processing requests of any kind.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digium | certified_asterisk | * | |
digium | certified_asterisk | 13.13 | |
digium | certified_asterisk | 13.13 | |
digium | certified_asterisk | 13.13 | |
digium | certified_asterisk | 13.13 | |
digium | certified_asterisk | 13.13 | |
digium | certified_asterisk | 13.13 | |
digium | certified_asterisk | 13.13 | |
digium | certified_asterisk | 13.13 | |
digium | certified_asterisk | 13.13 | |
digium | certified_asterisk | 13.13 | |
digium | certified_asterisk | 13.13 | |
digium | asterisk | * | |
digium | asterisk | * | |
digium | asterisk | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:certified_asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF0E7AD0-0B51-47BC-8746-CAC7C63F8AE8", "versionEndIncluding": "13.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert1:*:*:*:*:*:*", "matchCriteriaId": "0449B393-FA4E-4664-8E16-BE6B94E4872F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc1:*:*:*:*:*:*", "matchCriteriaId": "2ED8E415-64FA-4E77-A423-3478E606E58E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc2:*:*:*:*:*:*", "matchCriteriaId": "E13CA1DD-B384-4408-B4EC-1AA829981016", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc3:*:*:*:*:*:*", "matchCriteriaId": "EE28BD0A-EA30-4265-A5D6-0390F3558D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc4:*:*:*:*:*:*", "matchCriteriaId": "0F82048D-C65F-4439-BBE4-2D4A9B07EB7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert2:*:*:*:*:*:*", "matchCriteriaId": "6447B77F-3770-4703-9188-B7344ED98E94", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert3:*:*:*:*:*:*", "matchCriteriaId": "5C103924-1D61-4090-8ED5-4731371B2B2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert4:*:*:*:*:*:*", "matchCriteriaId": "08F87B09-3867-4CAE-BAD7-2206CD6CAF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert5:*:*:*:*:*:*", "matchCriteriaId": "0D12B31E-C30C-442A-9BD8-504CF7EB1321", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert6:*:*:*:*:*:*", "matchCriteriaId": "B43DA484-83DC-4489-9037-B85B845078E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert7:*:*:*:*:*:*", "matchCriteriaId": "D8740005-0BCF-4B76-A600-25A9BF0F3C42", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA00E078-97B8-4C2D-BD07-DB2A25908303", "versionEndIncluding": "13.8.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BE71990-160B-413F-AB66-C29C7C1CC82F", "versionEndIncluding": "14.7.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "D39329BD-4A6B-48DB-AFDB-DC58154CBDD8", "versionEndIncluding": "15.1.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in chan_skinny.c in Asterisk Open Source 13.18.2 and older, 14.7.2 and older, and 15.1.2 and older, and Certified Asterisk 13.13-cert7 and older. If the chan_skinny (aka SCCP protocol) channel driver is flooded with certain requests, it can cause the asterisk process to use excessive amounts of virtual memory, eventually causing asterisk to stop processing requests of any kind." }, { "lang": "es", "value": "Se ha descubierto un problema en chan_skinny.c en Asterisk Open Source en versiones 13.18.2 y anteriores, 14.7.2 y anteriores y 15.1.2 y anteriores y en Certified Asterisk 13.13-cert7 y anteriores. Si el controlador de canal chan_skinny (tambi\u00e9n conocido como protocolo SCCP) se inunda a base de determinadas peticiones, puede provocar que el proceso de asterisk utilice cantidades excesivas de memoria virtual, finalmente provocando que asterisk deje de procesar cualquier tipo de peticiones." } ], "id": "CVE-2017-17090", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-12-02T00:29:00.247", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.digium.com/pub/security/AST-2017-013.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102023" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1039948" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27452" }, { "source": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00028.html" }, { "source": "cve@mitre.org", "url": "https://www.debian.org/security/2017/dsa-4076" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/43992/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.digium.com/pub/security/AST-2017-013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102023" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1039948" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27452" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00028.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2017/dsa-4076" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/43992/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-459" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-02-22 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
chan_sip in Asterisk Open Source 1.8.x, 11.x before 11.21.1, 12.x, and 13.x before 13.7.1 and Certified Asterisk 1.8.28, 11.6 before 11.6-cert12, and 13.1 before 13.1-cert3, when the timert1 sip.conf configuration is set to a value greater than 1245, allows remote attackers to cause a denial of service (file descriptor consumption) via vectors related to large retransmit timeout values.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "matchCriteriaId": "253C303A-E577-4488-93E6-68A8DD942C38", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "matchCriteriaId": "E79AB8DD-C907-4038-A931-1A5A4CFB6A5B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6344E43-E8AA-4340-B3A7-72F5D6A5D184", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "4C170C1C-909D-4439-91B5-DB1A9CD150C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EE821BE5-B1D3-4854-A700-3A83E5F15724", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "149C57CA-0B4B-4220-87FC-432418D1C393", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "035595D5-BBEC-4D85-AD7A-A2C932D2BA70", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "6DAF5655-F09F-47F8-AFA6-4B95F77A57F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F8E001D8-0A7B-4FDD-88E3-E124ED32B81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9D5CFFBD-785F-4417-A54A-F3565FD6E736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "D30EF999-92D1-4B19-8E32-1E4B35DE4EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "A67D156B-9C43-444F-ADEC-B21D99D1433C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "893EB152-6444-43DB-8714-9735354C873A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8447EE7-A834-41D7-9204-07BD3752870C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C04F2C9-5672-42F2-B664-A3EE4C954C29", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "33465668-4C91-4619-960A-D26D77853E53", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "CAD08674-0B44-44EA-940B-6812E2D5077D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "EEE87710-A129-43AA-BA08-8001848975FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F582C6E-5DA0-4D72-A40E-66BDBC5CF2B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CEBB8-01B3-4A05-AFE8-37A143C9833E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "522733A7-E89E-4BFD-AC93-D6882636E880", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "2FAC47DD-B613-43E4-B9BF-6120B81D9789", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "86D20CB5-60E8-405E-B387-CF80C7DA5E07", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "71AB5A01-5961-4053-9111-CF32C6473A00", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*", "matchCriteriaId": "77D8E1DC-041F-4B87-AF9A-E0EC4D6A4BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7CCCB892-30CE-4BEF-904E-5D957F94D0EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "F156798F-F2EF-4366-B17E-03165AB437D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "9EFBB9A6-DD1D-436E-919F-74A3E4F40396", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "054E34C8-B6A5-48C7-938E-D3C268E0E8BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*", "matchCriteriaId": "1DCECA72-533A-4A95-AB19-20C5F09A1B01", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*", "matchCriteriaId": "0E2309F8-AFEE-4150-99D1-BA606432ED73", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*", "matchCriteriaId": "7785F282-BFA0-400A-8398-872ACCA4BF37", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1278D3FB-78C6-4F7D-A845-0A93D4F6E2B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "C00A6EFB-A848-46D3-AAD7-FD8140007E42", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "CB6E3972-5C53-4B6D-BFE1-67E1122EA013", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "048617A0-A783-4519-A947-35220D4CD786", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "DD493A41-E686-444C-A34E-412804510F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "87D25FD6-CC3A-4AB0-B7B1-67D07386F99D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C402E9E-09CC-4EFA-AC27-156437B05B22", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C8A41F9C-D2F4-47A9-80CD-2B1BF6B0CB63", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "627FF5B9-E5A8-4DBC-A891-B175011E72A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6146EB2E-BA32-4408-B10B-A711EC39C580", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "1C863324-05AE-4FCA-BD2E-39040A468DCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A85F51E7-0AAE-4F3B-9F90-BD2E31255822", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "315FB0D4-D4A4-4369-BFB8-F2CAEB429015", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "DC74D6C5-F410-4B68-AF92-056B727193A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "B70911F8-A526-4600-8198-03FF4CCB28DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA60A9C9-C2EF-4971-BEFB-FF687DAEF2F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:-:*:*:*:*:*:*", "matchCriteriaId": "984CD6D9-4A54-4065-8401-DC555AB95425", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:patch:*:*:*:*:*:*", "matchCriteriaId": "CDE13439-4124-4BDE-A068-460BCF96419B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "BAFB22FA-CC24-4AFE-AC83-2D044563F7CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "00F3EB0D-7C63-46B5-BA95-8486B9716C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "00C1BF3B-7593-478D-9AAA-153901C70286", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "82423EC2-FA29-4AF6-86C3-6AC6DFDC4DC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "5F86406A-0936-4A06-88FB-4137A64498EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "672CE4C0-EBD6-470B-937E-810FF1C4CDBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "88DB1105-74D8-4312-9D02-D1E21F2E785C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "404C0557-6229-4D90-BFDD-54AFFCCE6A19", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:-:*:*:*:*:*:*", "matchCriteriaId": "3F4DC562-649E-4105-8B3E-43F02BD593FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6D1D26CC-891F-4396-B7D7-30D712829E71", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F25B61EA-F4D1-452A-9D96-B8DFDD719B0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9324AB96-EC99-4F04-A0A9-00F936C86EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "1B8B5E76-4A74-4E88-8A6F-C23538B7642A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "BDB6BBCA-47CE-49B8-9706-AFDE4BE46550", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "8BFF65E2-692B-4C39-88FC-6DED8D9A7258", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "5260E309-9320-4DB8-A918-7D215BF95D2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:-:*:*:*:*:*:*", "matchCriteriaId": "58F4BFC9-E02A-4121-8D34-99022AB8B45A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "60AFF340-A866-4CFE-9334-53B95FD4AA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "74E50309-CD7D-41F7-97DA-A7E451D0796A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "6FD3F8F8-820E-4C29-9F8F-023D1DB999CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "C33A6419-0D00-49D6-9A48-2B633610AAED", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "447E07C9-4A25-418D-B53F-609B78EE4C21", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E8AE686-B618-4B0D-BD27-1F96295E964D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:-:*:*:*:*:*:*", "matchCriteriaId": "9C806F87-C897-48E4-8533-A4EBC6B77078", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:patch:*:*:*:*:*:*", "matchCriteriaId": "08B8C143-93FF-44DD-8F61-6F4FEE977371", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E9751C0A-84F5-4A43-8282-12A9DE559569", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F67E2694-F6F1-482C-91F2-D9FD856EA31B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "5E2D53AA-8D50-445F-9500-2F580F260DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.1:-:*:*:*:*:*:*", "matchCriteriaId": "8859F234-5066-40DD-862C-0F3CCA98AFB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.1:patch:*:*:*:*:*:*", "matchCriteriaId": "75962F03-EC19-4920-9FA7-2D422E6E83F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12:*:*:*:*:*:*:*", "matchCriteriaId": "8D9D7D88-D64F-4F54-8C84-6AC45FBD36F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "F67AB282-591C-4ED7-9750-C593A38D5D7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:-:*:*:*:*:*:*", "matchCriteriaId": "B5D0BB0E-1BB0-4F31-9C5D-DC1A069E52DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "C9F8F881-2BF7-44AB-8756-54A06801EB11", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "36EFF3C4-4D00-4BC5-94B9-403BB00C6AB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "5E434F10-395E-426E-A988-4CDA504577D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "33FE3DCE-74B5-49A4-BC18-34B22CA83947", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "FF2E25F3-053D-4F7D-A35D-706A401CCAA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "8880AE7C-3E44-4B76-B500-E93868D4CF5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7C94269D-A271-42AC-A44C-102C814E564B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E7E5B826-D3D5-4D2D-BB4D-2C1BEDE92456", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "5BA564F7-7A69-4805-8C8C-C2EB5E12A6E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.0:-:*:*:*:*:*:*", "matchCriteriaId": "2A153336-10C4-4C42-AC66-AC1351887EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.0:patch:*:*:*:*:*:*", "matchCriteriaId": "0C2FF4E9-2513-4022-AF80-6F44A2287D6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "DF6FA464-F9D3-4674-844B-A2B2E2C42A51", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "44722C8B-BB37-4444-A58A-F01D0B3B4DDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "C4FABFDB-D99A-4F83-8FEE-3BFA36BA4061", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.1:-:*:*:*:*:*:*", "matchCriteriaId": "43E00618-19F6-4828-818A-95C9106097B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.1:patch:*:*:*:*:*:*", "matchCriteriaId": "CEC4F4AE-7BD8-437F-8838-FE564BCB7FA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "A842E112-8974-4E74-AD56-1DEF5B5DD9F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.15.0:-:*:*:*:*:*:*", "matchCriteriaId": "2BC3B463-6B2C-42AF-BE13-50B7D63E7F05", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.15.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D9ACBC01-8A9D-43A5-A825-1CC9670417A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "61E7199F-EACE-431A-8ADD-B96A6FCDBC49", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA7CD0E5-8E69-43B5-A5FF-8B122475CC00", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.16.0:-:*:*:*:*:*:*", "matchCriteriaId": "2799111C-06DB-4979-8F81-A8C09D53E5F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.16.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "F4BEA1B2-2103-4E25-92A9-DB107D6D4AD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.16.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "2AD9AFFB-F903-43DD-9C1D-4D8E83EA25C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "6F368897-A481-42DD-A8B0-8AD43A5FD68B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:-:*:*:*:*:*:*", "matchCriteriaId": "4F3C35F1-CBF2-4F77-AC19-574DEF2652A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:patch:*:*:*:*:*:*", "matchCriteriaId": "75EA94FD-D16A-49BC-A418-36EFC187EC7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6BA8F4AF-26C0-4A69-B489-16E7A56E5123", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FE82D53D-092D-4B36-A979-23E9A5E07A78", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "27365383-72DB-4683-9A67-CF553FF2620A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "46EE63D4-CA9C-4DF4-AF85-B8AC2E3F844A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.0:-:*:*:*:*:*:*", "matchCriteriaId": "A14FC2A1-29D5-49FE-92A9-D61833BF1C95", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "91407E03-4E98-4DD9-B584-E5BB74F09B9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "669CC22C-45E5-40AB-9A95-D7DFD694B688", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "80A38E0C-45D9-4353-8426-87A4CFA371DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:-:*:*:*:*:*:*", "matchCriteriaId": "5E3C5C1E-67E9-401A-BA52-FCB32CA4473C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "54A934AE-AB7C-4D10-8BA2-9C54410C648F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "7A7C5A8E-35E6-4B86-8502-1970031AB987", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "1FA4C14B-A01C-4CFE-8985-317ACCDAD209", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:-:*:*:*:*:*:*", "matchCriteriaId": "501F5764-BBC2-426A-AF01-7FB477850073", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:patch:*:*:*:*:*:*", "matchCriteriaId": "FDB35CE5-4EDB-4949-A5E4-1BD721CCA469", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "619704FF-2F0C-47E8-A340-58135CEE6B89", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E412E336-871A-4CAC-97E5-FB203BB9349D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.1:-:*:*:*:*:*:*", "matchCriteriaId": "82ED9CD2-504E-4D7B-B242-2511A7730776", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.1:patch:*:*:*:*:*:*", "matchCriteriaId": "EF6E50F5-605A-4D2B-B55D-8AB251532E8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.2:-:*:*:*:*:*:*", "matchCriteriaId": "F6C796AE-95EE-4EAB-959C-1C1353C565A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.2:patch:*:*:*:*:*:*", "matchCriteriaId": "EEAF3B2E-E520-4F43-ACC5-0F01A6247199", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.21.0:-:*:*:*:*:*:*", "matchCriteriaId": "085D4102-E2E8-496C-85B7-714FD3639BE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.21.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "FC1A0E66-63F4-4BD0-8C9A-3D23A116EE08", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.21.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "79963FF0-5ED6-41B6-8E60-146BD7879518", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.22.0:-:*:*:*:*:*:*", "matchCriteriaId": "E0ABBB2C-19EC-4D6C-A1EA-AEF0ABA4123D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.22.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0787BC7B-9464-4AAA-896B-C028ECF8E397", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.22.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "84C0FBC8-9CD1-4135-94C7-BE90A7C94625", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:-:*:*:*:*:*:*", "matchCriteriaId": "981F3994-392D-47DB-97DA-AC15BA070A36", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:patch:*:*:*:*:*:*", "matchCriteriaId": "94691EE6-266F-46CE-B388-0289EB39D91A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "FD3948A1-B5A6-4702-9187-A7720E81B7F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "BC097BB6-02E9-4F48-98CB-B5F31B41009C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C2FD962-B1D5-41E5-884E-0C3F7F9DACE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.24.0:-:*:*:*:*:*:*", "matchCriteriaId": "096E966A-878B-426F-AB40-BB476B17B969", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.24.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "852DAF2A-86F3-4D05-91DC-6A2FBC214736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.24.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "7D721486-3043-4380-A73C-44B4DD0E34C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "1F29E2EE-B6E8-4E55-84A8-3BD0658387EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.25.0:-:*:*:*:*:*:*", "matchCriteriaId": "837BF2BD-814F-4503-91DF-EE16B5A4921D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.25.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "15FCDDB3-62D8-446C-B57C-F3BBFBD13491", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.25.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "03512BDE-E441-46F6-88B7-16A2468CA199", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.26.0:-:*:*:*:*:*:*", "matchCriteriaId": "902CAF9D-9D02-47FA-AE2E-EC1268A32BA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.26.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "80AD87B5-B796-4C44-8A6D-0B22AA2903CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.26.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D87B2B3-E40B-4BF7-91E6-3B3F9CA28719", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "2575F7A4-E1F1-4836-A467-076EDD8484B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.27.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CBDFAFA3-A52F-4FC8-BA51-FE52D5F57DD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.27.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6085E437-87B8-4355-BDC0-A14EA4F52695", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "5C44D1ED-2435-4042-BF15-3D752BE0C661", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.28.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "23E4CE5C-375C-4ECB-A4D9-A5A6805E5FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "236D459B-ED50-4A2F-B463-D2F9DD1C7E8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.28.2:*:*:*:*:*:*:*", "matchCriteriaId": "E9EEB00A-68B0-4CDE-B625-AB83B1D6D2F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.32.0:*:*:*:lts:*:*:*", "matchCriteriaId": "72195459-404F-423E-A78C-DE2A728AFDA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F53B8453-F35A-49BE-8129-774BADF71BA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "CCB0C07E-DA2F-4169-848D-C3315CDC1CB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "410C43E6-5912-4C22-A592-7CF94402EEB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D50A355E-1B55-4DD2-8100-EB81AA6FC40E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "9ADF4230-EFEB-45EC-9C96-0262B4A3E459", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "5234531C-F69A-4B94-A480-147734206C5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "321C1066-6800-4488-A7C4-BE91FF738453", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9B51588-50A2-40B2-A007-06F57D38C7AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CDE2B00C-6AC0-4166-8A25-EFC42CE7F737", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "9FD404B4-2B0A-4D7A-8CF6-E2C6B4BACBB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "617FC4AF-D152-4EE1-828D-C2A6AD0DFD3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3A3FE6DC-17FD-4CEE-BDFB-9D4685640381", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8CEEB6C2-0A6D-4434-8446-CB8605CD3B14", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "1548C574-CD51-49F6-91B1-B06C504000E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "1453BB31-D674-4A05-AB2A-2502D127C3E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "868865A1-E074-4DB0-A119-D24C5C53FEF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "1794440C-7068-4673-9142-6221B8A39E5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "C5CF286B-3377-4AE9-A7B9-8535641D639A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "50EC8D9D-3483-4080-8000-496343BC8BFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6695F632-6AC4-400F-B513-280304ABC1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "A3423C40-240A-4237-8B0F-A4B4ED421C3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:-:*:*:*:*:*:*", "matchCriteriaId": "03298D9F-CFB8-48F9-BD0C-8A0BEB0760C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "87FCBE6A-C1CD-48EF-A435-4CEADD46C917", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "42E0E639-70A2-41EE-9B34-A9223D1958AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "32E84D64-0CB8-46BF-BD3F-8CA2E0CE4C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A70420A8-8571-4528-98E1-72BE00270C6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "A276363F-F897-4E6D-9D55-5F5AA73DEE26", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "38230656-6242-4D24-AA67-F42A6FA2FC7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "20ED9FC3-5E56-4AE7-903F-267CAE7F2CA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "84F88075-9935-45BF-88B7-21ACE8AAB314", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "DB16D9D6-A2F6-4C4B-B364-1B63B1FFB5F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "283793E4-0AE8-48D9-ABCF-70E44FE55C4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "A0F79D5F-EB28-417A-86DF-053D6EDBA161", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.10.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "4A036F91-70E0-4E97-9896-EEE97BE3C20E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "C4EABFC3-24FA-4441-9F2B-650D90AE5CC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.11.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3DA61A22-3DD0-46A3-8C13-F25F4F03FD35", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "2026FD07-103C-4691-AFA4-88C490382F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.12.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "791700CD-E007-489E-9BC6-37025CAA8144", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "4061B4C7-8315-450C-866A-C4F3A6BCB1A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.13.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "C6EA7154-7F08-4E43-9270-E617632230AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.14.0:*:*:*:lts:*:*:*", "matchCriteriaId": "4149F36C-D455-415F-93D7-F92EEE41419D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.14.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "2DC51129-8F38-4505-90FB-4FFDED45BABF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.14.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "4CA571E0-B513-47AA-95BE-EB4DD2AA91E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A62DFFE-637B-4911-B3B4-6DA4053CBDBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.15.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "96C7950F-41D1-46B5-BA62-E8450CB81244", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.15.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "C9A32ECC-E208-4834-8EF7-FEF7A3495041", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "9F7C5D35-A6AE-4A2E-98C5-CB58FF22AF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.16.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "AA3E0D41-2E6E-4294-8E56-1A738A7F9AA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.17.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D16109B8-4CDF-46FC-9AD9-A158E532791B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "FD4D1A5A-99A3-4D23-B40C-BBE11EA5B325", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.18.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0F5EE428-98FF-42BC-9F61-311327B8F610", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.19.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CBA2FD08-D761-410F-9804-A76F0DD77349", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.20.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "74B34C21-D90B-4E32-BBA6-7773DB663F18", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "1D3AF185-7AC6-491E-9BE0-8ECD163A3E77", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.21.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "90996D49-5731-4F7D-9DBE-D0599A5D85A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.21.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D3C91C8D-707D-443D-985F-FA3EDB181208", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.21.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "25E7F7F5-E85A-4720-B5C9-2B776B04D904", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B446105E-6C8E-495A-BF83-A33CB33485A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:-:*:*:*:*:*:*", "matchCriteriaId": "F3DE062D-4E87-4691-A664-D9E7C02036EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3B4D6D24-A718-4962-AD4E-F19AFB03BFF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "BE2F0D0D-761C-4338-93F0-506E94E57000", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "3D38DFCA-E357-4A28-8F03-FDADF40A5185", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "B3CD4A85-26FB-4AE5-9CB7-4DF38DF32482", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F42C9442-9EBC-4CA5-AB1C-BA0662C27BDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "71762B58-A08B-405B-9596-6D15CF4A95D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "EA48C05A-E898-42EE-A699-94BBD66E5E0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "EDCB78F8-AAC8-44B1-BDF4-C73BC8951EC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D92FFF6-E7B2-4210-A652-79AC6B74002C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "DB5E92FB-9CF8-461E-A665-3407D265DF17", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "536F6C10-3165-40F7-931A-23765AB87555", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "B8DD16DF-C47C-41CF-8CDE-C365103262A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "43C06F98-62F4-4008-A463-2791BEDF6DED", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "133288EC-8A78-4C9D-BF94-9900CD3D2260", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B2E54998-B257-478E-9E52-2BB4F4CD6429", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "5FD4498A-72BD-40EB-A332-DE10C87C1015", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "71961599-009C-42F4-AA26-9B16C39F3CBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B98A2EA6-DCC6-4F8B-B132-6692AED16CF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "672EDC0E-D70A-4BB0-B7FE-5D422C737862", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.7.0:*:*:*:lts:*:*:*", "matchCriteriaId": "C779E0D4-0375-4BE8-9667-A32C68B66D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.7.0:*:*:*:standard:*:*:*", "matchCriteriaId": "6DEF3D58-73E0-402A-A15F-05CA72B5B288", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "8E9E50F8-0123-4C9E-88E1-5DCE08770B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F7C605A3-8517-4215-9AD3-980D587B22DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "866815AE-D1FE-460C-A3BC-70C251655C1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "44746060-BC6F-4E6D-BA81-61623B2D27FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "47548ADE-255A-4355-BD06-1FEF134C1620", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "ABCFC4D9-8054-4F42-BE7E-5092F6648F95", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "84A7DBB5-999C-4AE8-BC5D-F0C5F77957DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "EB1EA7C5-CE37-4A7E-AF81-636228F3BA53", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.0:*:*:*:lts:*:*:*", "matchCriteriaId": "E7D1238A-A8D2-485E-81FD-46038A883EC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FB2C4E1E-6B90-4DCC-BC09-7D19FBA65C3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "58C0FF1B-6188-4181-A139-1806328762BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "890EBB8C-989B-4344-AC03-62B399076008", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "BD4AAECB-A2BC-45BA-BC63-E51C1FE6C334", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "136D6508-660E-410D-829A-7DD452BF8819", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "AEC2B3AA-EB24-4259-BED1-5DBC102FE9C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CEA9DA4A-A3E6-4C46-9471-CCBFA71083AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "599833A2-CBE9-479B-8A6E-AF79C5EED1DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B55719B3-7325-47E1-8D16-3F34B1F44385", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B870B3B7-E8DC-45A2-8FA4-657D005D00E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "C91E9A3B-54EB-4819-94DD-30F7D0C90047", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "47189DF9-8E57-4BA6-9F52-B7A8229AE02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "905722CB-4B6C-4849-88CD-22E972432E36", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "84AAFA3C-3CCD-4615-9725-169C303CF18F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "C92E0801-9E8F-4CF2-A4A0-48BCF550F2D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.7.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "10823FD4-D618-4050-91D7-CBDE69BC570D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.28:-:*:*:*:*:*:*", "matchCriteriaId": "96463965-1F99-42DB-9745-5B4E49A48F40", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:*:*:*:*", "matchCriteriaId": "322694EF-B086-4BE7-A9F0-41D3A9C245FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:lts:*:*:*", "matchCriteriaId": "6AD7C9B3-D029-4E05-8E80-3ADA904FAC1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc2:*:*:*:*:*:*", "matchCriteriaId": "770CCEEA-B121-454B-BD36-3FC1B262998A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert10:*:*:lts:*:*:*", "matchCriteriaId": "BB47EA31-CF9D-4752-804B-7804151EC87C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert11:*:*:lts:*:*:*", "matchCriteriaId": "A1C9B744-1745-4E9D-A2DE-4659295508D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:*:*:*:*", "matchCriteriaId": "013B1940-C45D-4FE2-8B49-D92B8F1A9048", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:lts:*:*:*", "matchCriteriaId": "CE71221B-4D55-4643-B6D1-307B2CF41F98", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:*:*:*:*", "matchCriteriaId": "A98B11B5-B8E2-4903-B4F7-3AC23751AE8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:lts:*:*:*", "matchCriteriaId": "88124275-9BEB-4D53-9E4D-1AC8C52F2D0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert4:*:*:lts:*:*:*", "matchCriteriaId": "4F3CEFEF-72B6-4B58-81FE-01BCEEFB3013", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert5:*:*:lts:*:*:*", "matchCriteriaId": "AA637187-0EAE-4756-AD72-A0B2FABCA070", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert6:*:*:lts:*:*:*", "matchCriteriaId": "6DAF6784-0B31-4104-9D85-473D5AFAB785", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert7:*:*:lts:*:*:*", "matchCriteriaId": "77B06B83-D62C-4A0E-BE94-83C9A02CE55A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert8:*:*:lts:*:*:*", "matchCriteriaId": "CAD17809-CBB1-4E41-99C9-20FE56853563", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert9:*:*:lts:*:*:*", "matchCriteriaId": "066453F2-A77F-4E82-8C91-AC17FAA21A89", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6.0:*:*:*:lts:*:*:*", "matchCriteriaId": "D6EE9895-FB94-451D-8701-8C0DD8F5BED0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6.0:-:*:*:*:*:*:*", "matchCriteriaId": "CCDDF5C2-9B45-4811-90F6-984EF4B220CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "56849E34-B192-46A8-A517-C7C184A901B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "4610D544-156F-4E9A-BC46-9E0FF8D5D641", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "CA74CB86-72C3-4913-8EB6-3BBA1D3BC65D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1:cert1:*:*:*:*:*:*", "matchCriteriaId": "0C6CF412-290C-4524-9AFE-D58A85183864", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1:cert2:*:*:*:*:*:*", "matchCriteriaId": "BA3211EE-E305-4247-AA2E-910E48CBCDF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9F68ED1E-8D2B-4AEE-B5DE-FD50338BA82D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "EA9F296A-4932-4EA4-8B38-80856A9D6374", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "B40673A6-2980-440A-B78E-D5C7095E3FA6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "chan_sip in Asterisk Open Source 1.8.x, 11.x before 11.21.1, 12.x, and 13.x before 13.7.1 and Certified Asterisk 1.8.28, 11.6 before 11.6-cert12, and 13.1 before 13.1-cert3, when the timert1 sip.conf configuration is set to a value greater than 1245, allows remote attackers to cause a denial of service (file descriptor consumption) via vectors related to large retransmit timeout values." }, { "lang": "es", "value": "chan_sip en Asterisk Open Source 1.8.x, 11.x en versiones anteriores a 11.21.1, 12.x y 13.x en versiones anteriores a 13.7.1 y Certified Asterisk 1.8.28, 11.6 en versiones anteriores a 11.6-cert12 y 13.1 en versiones anteriores a 13.1-cert3, cuando la configuraci\u00f3n de timert1 en sip.conf se establece en un valor mayor que 1245, permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de descriptor de archivo) a trav\u00e9s de vectores relacionados con valores de caducidad de retransmisi\u00f3n grandes." } ], "id": "CVE-2016-2316", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-02-22T15:59:02.160", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2016-002.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177409.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177422.html" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2016/dsa-3700" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/82651" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034930" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2016-002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177409.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177422.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2016/dsa-3700" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/82651" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034930" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-191" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-02-22 00:29
Modified
2024-11-21 04:11
Severity ?
Summary
A Buffer Overflow issue was discovered in Asterisk through 13.19.1, 14.x through 14.7.5, and 15.x through 15.2.1, and Certified Asterisk through 13.18-cert2. When processing a SUBSCRIBE request, the res_pjsip_pubsub module stores the accepted formats present in the Accept headers of the request. This code did not limit the number of headers it processed, despite having a fixed limit of 32. If more than 32 Accept headers were present, the code would write outside of its memory and cause a crash.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digium | asterisk | * | |
digium | asterisk | * | |
digium | asterisk | * | |
digium | certified_asterisk | 13.18 | |
digium | certified_asterisk | 13.18 | |
digium | certified_asterisk | * | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "E88E5DD3-A16C-4026-A7E3-02C5C8AEFA0C", "versionEndIncluding": "13.19.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "2BBC6235-486B-46AE-96C1-A8F5B68A1D96", "versionEndIncluding": "14.7.5", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "D63485A9-4464-49C7-ACF8-826303D8C152", "versionEndIncluding": "15.2.1", "versionStartIncluding": "15.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.18:cert1:*:*:*:*:*:*", "matchCriteriaId": "05795EED-0473-4806-A9AD-FD92212CCC77", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.18:cert2:*:*:*:*:*:*", "matchCriteriaId": "C3F701AA-E842-4680-9747-000C3A4F6E4B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:certified_asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "56E4037E-1F6F-4E1A-8549-38219F0A8E91", "versionEndIncluding": "13.18", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Buffer Overflow issue was discovered in Asterisk through 13.19.1, 14.x through 14.7.5, and 15.x through 15.2.1, and Certified Asterisk through 13.18-cert2. When processing a SUBSCRIBE request, the res_pjsip_pubsub module stores the accepted formats present in the Accept headers of the request. This code did not limit the number of headers it processed, despite having a fixed limit of 32. If more than 32 Accept headers were present, the code would write outside of its memory and cause a crash." }, { "lang": "es", "value": "Se ha descubierto un problema de desbordamiento de b\u00fafer en Asterisk hasta la versi\u00f3n 13.19.1; versiones 14.x anteriores a la 14.7.5 y las versiones 15.x anteriores a la 15.2.1, as\u00ed como Certified Asterisk hasta la versi\u00f3n 13.18-cert2. Al procesar una petici\u00f3n SUBSCRIBE, el m\u00f3dulo res_pjsip_pubsub almacena los formatos aceptados presentes en las cabeceras Accept de la petici\u00f3n. Este c\u00f3digo no limitaba el n\u00famero de cabeceras que procesaba, a pesar de tener un l\u00edmite fijado en 32. Si estuviesen presentes m\u00e1s de 32 cabeceras Accept, el c\u00f3digo escribir\u00eda fuera de la memoria y provocar\u00eda un cierre inesperado." } ], "id": "CVE-2018-7284", "lastModified": "2024-11-21T04:11:56.303", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-22T00:29:01.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2018-004.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103151" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040416" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4320" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/44184/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2018-004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103151" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040416" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4320" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/44184/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-02-18 21:15
Modified
2024-11-21 05:56
Severity ?
Summary
Incorrect access controls in res_srtp.c in Sangoma Asterisk 13.38.1, 16.16.0, 17.9.1, and 18.2.0 and Certified Asterisk 16.8-cert5 allow a remote unauthenticated attacker to prematurely terminate secure calls by replaying SRTP packets.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digium | asterisk | * | |
digium | asterisk | * | |
digium | asterisk | * | |
digium | asterisk | * | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA727A7F-D350-450F-BF24-9E6D45FA6930", "versionEndIncluding": "13.38.2", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "7382B641-0396-456F-BF33-3F6412E35F2D", "versionEndExcluding": "16.16.1", "versionStartIncluding": "16.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5BA8606-ADA9-4841-A7E2-A9165138849A", "versionEndExcluding": "17.9.2", "versionStartIncluding": "17.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "F10CB148-DF9C-4134-A417-3B111C036E20", "versionEndExcluding": "18.2.1", "versionStartIncluding": "18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:-:*:*:*:*:*:*", "matchCriteriaId": "81C3E390-8B99-4EB8-82DD-02893611209A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc1:*:*:*:*:*:*", "matchCriteriaId": "17DB2297-1908-4F87-8046-2BAA74569D71", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc2:*:*:*:*:*:*", "matchCriteriaId": "CEA2CC40-C2F6-4828-82F0-1B50D3E61F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc3:*:*:*:*:*:*", "matchCriteriaId": "32F19F43-C1E8-4B6C-9356-AF355B7320BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc4:*:*:*:*:*:*", "matchCriteriaId": "21D1FA32-B441-485F-8AE9-F3A394626909", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert2:*:*:*:*:*:*", "matchCriteriaId": "F7795CCF-B160-4B4F-9529-1192C11D7FDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert3:*:*:*:*:*:*", "matchCriteriaId": "0C5E5D0D-9EB3-40FD-8B7E-E93A95D07AB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert4:*:*:*:*:*:*", "matchCriteriaId": "C7DFDA30-DD61-4BBC-AFE4-448BF2A4F303", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc1:*:*:*:*:*:*", "matchCriteriaId": "142F1F89-49AC-4A0B-A273-61F697063A5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc2:*:*:*:*:*:*", "matchCriteriaId": "53041795-788C-4914-A2F6-41539ABE0244", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc3:*:*:*:*:*:*", "matchCriteriaId": "FBB98E65-B2D0-49A4-8BF3-12155E3E13C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc4:*:*:*:*:*:*", "matchCriteriaId": "769C854C-03CD-40A9-B39B-C0CDCA8252EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert5:*:*:*:*:*:*", "matchCriteriaId": "6D86AD6E-4E07-48B0-88D8-E18F277FFE6A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect access controls in res_srtp.c in Sangoma Asterisk 13.38.1, 16.16.0, 17.9.1, and 18.2.0 and Certified Asterisk 16.8-cert5 allow a remote unauthenticated attacker to prematurely terminate secure calls by replaying SRTP packets." }, { "lang": "es", "value": "Los controles de acceso incorrectos en el archivo res_srtp.c en Sangoma Asterisk versiones 13.38.1, 16.16.0, 17.9.1 y 18.2.0 y Certified Asterisk 16.8-cert5, permite a un atacante remoto no autenticado finalizar prematuramente llamadas seguras al reproducir paquetes SRTP" } ], "id": "CVE-2021-26712", "lastModified": "2024-11-21T05:56:43.550", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-18T21:15:11.447", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/161473/Asterisk-Project-Security-Advisory-AST-2021-003.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Feb/59" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/AST-2021-003.html" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-29260" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/161473/Asterisk-Project-Security-Advisory-AST-2021-003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Feb/59" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/AST-2021-003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-29260" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-02-18 20:15
Modified
2024-11-21 05:57
Severity ?
Summary
An issue was discovered in res_pjsip_session.c in Digium Asterisk through 13.38.1; 14.x, 15.x, and 16.x through 16.16.0; 17.x through 17.9.1; and 18.x through 18.2.0, and Certified Asterisk through 16.8-cert5. An SDP negotiation vulnerability in PJSIP allows a remote server to potentially crash Asterisk by sending specific SIP responses that cause an SDP negotiation failure.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digium | asterisk | * | |
digium | asterisk | * | |
digium | asterisk | * | |
digium | asterisk | * | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 | |
digium | certified_asterisk | 16.8 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "37BA1B0D-474E-4F73-A329-F703C928C07D", "versionEndExcluding": "13.38.2", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "7382B641-0396-456F-BF33-3F6412E35F2D", "versionEndExcluding": "16.16.1", "versionStartIncluding": "16.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5BA8606-ADA9-4841-A7E2-A9165138849A", "versionEndExcluding": "17.9.2", "versionStartIncluding": "17.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "F10CB148-DF9C-4134-A417-3B111C036E20", "versionEndExcluding": "18.2.1", "versionStartIncluding": "18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:-:*:*:*:*:*:*", "matchCriteriaId": "81C3E390-8B99-4EB8-82DD-02893611209A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc1:*:*:*:*:*:*", "matchCriteriaId": "17DB2297-1908-4F87-8046-2BAA74569D71", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc2:*:*:*:*:*:*", "matchCriteriaId": "CEA2CC40-C2F6-4828-82F0-1B50D3E61F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc3:*:*:*:*:*:*", "matchCriteriaId": "32F19F43-C1E8-4B6C-9356-AF355B7320BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc4:*:*:*:*:*:*", "matchCriteriaId": "21D1FA32-B441-485F-8AE9-F3A394626909", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert2:*:*:*:*:*:*", "matchCriteriaId": "F7795CCF-B160-4B4F-9529-1192C11D7FDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert3:*:*:*:*:*:*", "matchCriteriaId": "0C5E5D0D-9EB3-40FD-8B7E-E93A95D07AB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert4:*:*:*:*:*:*", "matchCriteriaId": "C7DFDA30-DD61-4BBC-AFE4-448BF2A4F303", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc1:*:*:*:*:*:*", "matchCriteriaId": "142F1F89-49AC-4A0B-A273-61F697063A5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc2:*:*:*:*:*:*", "matchCriteriaId": "53041795-788C-4914-A2F6-41539ABE0244", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc3:*:*:*:*:*:*", "matchCriteriaId": "FBB98E65-B2D0-49A4-8BF3-12155E3E13C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc4:*:*:*:*:*:*", "matchCriteriaId": "769C854C-03CD-40A9-B39B-C0CDCA8252EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:16.8:cert5:*:*:*:*:*:*", "matchCriteriaId": "6D86AD6E-4E07-48B0-88D8-E18F277FFE6A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in res_pjsip_session.c in Digium Asterisk through 13.38.1; 14.x, 15.x, and 16.x through 16.16.0; 17.x through 17.9.1; and 18.x through 18.2.0, and Certified Asterisk through 16.8-cert5. An SDP negotiation vulnerability in PJSIP allows a remote server to potentially crash Asterisk by sending specific SIP responses that cause an SDP negotiation failure." }, { "lang": "es", "value": "Se detect\u00f3 un problema en el archivo res_pjsip_session.c en Digium Asterisk versiones hasta 13.38.1;\u0026#xa0;14.x, 15.x y 16.xa 16.16.0;\u0026#xa0;17.xa 17.9.1;\u0026#xa0;y 18.xa 18.2.0, y Certified Asterisk versiones hasta 16.8-cert5.\u0026#xa0;Una vulnerabilidad de negociaci\u00f3n SDP en PJSIP permite a un servidor remoto bloquear potencialmente Asterisk mediante el env\u00edo de respuestas SIP espec\u00edficas que causan un fallo en la negociaci\u00f3n SDP" } ], "id": "CVE-2021-26906", "lastModified": "2024-11-21T05:57:00.817", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-18T20:15:12.743", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/161477/Asterisk-Project-Security-Advisory-AST-2021-005.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Feb/61" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/AST-2021-005.html" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-29196" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/161477/Asterisk-Project-Security-Advisory-AST-2021-005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Feb/61" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/AST-2021-005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-29196" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-404" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-10-10 01:30
Modified
2025-04-20 01:37
Severity ?
Summary
In Asterisk 11.x before 11.25.3, 13.x before 13.17.2, and 14.x before 14.6.2 and Certified Asterisk 11.x before 11.6-cert18 and 13.x before 13.13-cert6, insufficient RTCP packet validation could allow reading stale buffer contents and when combined with the "nat" and "symmetric_rtp" options allow redirecting where Asterisk sends the next RTCP report.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://downloads.asterisk.org/pub/security/AST-2017-008.html | Vendor Advisory | |
cve@mitre.org | http://www.debian.org/security/2017/dsa-3990 | Third Party Advisory | |
cve@mitre.org | https://issues.asterisk.org/jira/browse/ASTERISK-27274 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://downloads.asterisk.org/pub/security/AST-2017-008.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2017/dsa-3990 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://issues.asterisk.org/jira/browse/ASTERISK-27274 | Issue Tracking, Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:13.0.0:*:*:*:lts:*:*:*", "matchCriteriaId": "E7D1238A-A8D2-485E-81FD-46038A883EC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "E93A7967-9A04-424A-BDDB-A2B8289B9AC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "8F75C9FF-6F95-4F6A-B683-FE2BEDE3AD10", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "68226156-42ED-4F0E-93E1-02DD57E582B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FB2C4E1E-6B90-4DCC-BC09-7D19FBA65C3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A4EB385E-28B5-4259-9431-99E1F32D61B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "58C0FF1B-6188-4181-A139-1806328762BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "890EBB8C-989B-4344-AC03-62B399076008", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "BD4AAECB-A2BC-45BA-BC63-E51C1FE6C334", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "121EACD3-D5E3-4691-8024-95996865BB65", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "136D6508-660E-410D-829A-7DD452BF8819", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "AEC2B3AA-EB24-4259-BED1-5DBC102FE9C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "74B23D17-7356-4D37-8C73-E87896D1335B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CEA9DA4A-A3E6-4C46-9471-CCBFA71083AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "81A8A6CB-D236-4AB3-8476-C2D34DB7EF31", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "599833A2-CBE9-479B-8A6E-AF79C5EED1DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B55719B3-7325-47E1-8D16-3F34B1F44385", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B870B3B7-E8DC-45A2-8FA4-657D005D00E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "C91E9A3B-54EB-4819-94DD-30F7D0C90047", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "47189DF9-8E57-4BA6-9F52-B7A8229AE02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "84AAFA3C-3CCD-4615-9725-169C303CF18F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "C92E0801-9E8F-4CF2-A4A0-48BCF550F2D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "5C1C39FA-EF1A-4F2B-87A0-A00BAE73C6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "677D1211-0B07-47B9-AB7A-E820E2B29561", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "84202BAF-29E1-472B-B11F-B73F6A8891CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "FFC7120D-E6A0-4801-A1CC-3E143896EE72", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "BAF2A83D-D9AE-441D-8D4E-335BF9D28A63", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "7F5C1479-A540-4B7D-B00C-BD35EEC83BB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "AC12556C-5E82-47D7-87E5-FBDC01A920DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "461C1D2D-C4C1-4FF8-8231-38A2505F3523", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "66595711-8573-4A9B-A8FE-4943E3097AA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5D1FE3D4-A0B9-475A-9B89-B0222283A6A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "9670B5AC-CBD1-484C-90F8-69B1A60B6054", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "EE5794B6-246C-415E-8E20-56447F152488", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "E726CA39-A763-4422-B59E-E9E12518EA4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.12:*:*:*:*:*:*:*", "matchCriteriaId": "6A96EB57-835A-45B4-82F5-31F925A85629", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "206F1DC9-9E8F-4497-A354-4A14711993DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "8D428364-E2AD-4BC6-9329-71793BC0EB61", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "08963910-E0BD-4487-B669-60E0BFA79863", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.13:*:*:*:*:*:*:*", "matchCriteriaId": "86B16D04-3808-4380-8F64-0C36B185C1F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "F3BD16A9-24BC-4FC1-81BA-A6D1FEF38D35", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "68BAAD53-DE75-41CA-BF60-C0363029D3A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "CDC383B3-27EF-4C37-94BE-F0D41B34CAFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.14.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "A7824B34-06C3-403B-B6F3-C850D54438EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.14.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "17E86941-98F6-45A5-8646-6876F74D909F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "C6DB27C0-C74E-4E6A-AA63-09CFE73C2EF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "6C443A3B-DF96-4A68-B046-DE13689CA974", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.15.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5F3AC9AE-288C-4F0E-BF15-C3F4AF09D8E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.15.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "796A6021-9FCA-4354-A47C-7500C363C168", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.15.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "EBB9D073-195F-4C2A-932E-7F027710DB25", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "604E58C8-9B81-4992-8993-4A6CB876EE08", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "077C4CB8-1FDE-45D3-82E6-CE09A22809B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.16.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3CDB96CA-5AAE-4B39-8E01-2E72E3B476AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.16.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "8EB33EC3-CDE0-40BD-B269-512AE074D278", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "363FA95F-03EF-4D6A-A40D-76D285D16255", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.17.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "FA96DC31-4BAC-4C5A-923C-EBBFFC7ABB52", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:14.0:*:*:*:*:*:*:*", "matchCriteriaId": "C949D5F5-6C0B-4B17-85B6-3A77D08CF967", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D413741-BDB7-496D-A01B-75E2A98FDB5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "29130F7F-DE00-43E1-A4A6-8F1F95D5CB19", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "25E94EC0-F577-4B2B-8B11-DC76278CDD42", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "101AD474-9B89-483D-84E8-08012677C55C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D57E41F6-C2CF-4183-A78A-9531A88FB65D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FB1F9BB8-F951-427E-B770-69C2ACEBDB28", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C4CE405-E923-4C9C-849A-D1031C4DB493", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.1:*:*:*:*:*:*:*", "matchCriteriaId": "C039C0CE-9C9C-4D85-8D7C-574DCF9D920B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.01:*:*:*:*:*:*:*", "matchCriteriaId": "A1B2F2CC-18C3-46E7-8E7F-970622A710C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "04ECDFF1-9718-4FAE-B45B-4F8CCA82829E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D2C4DA60-5701-4BD0-B2F9-D93B9E64111F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "0B12834D-2AF1-4AD1-AB23-859CAA5D3210", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.02:*:*:*:*:*:*:*", "matchCriteriaId": "89036D04-EA04-4041-9694-6768478D35F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.2:*:*:*:*:*:*:*", "matchCriteriaId": "B19070D3-9F03-43C7-9F31-9A54BD5F2441", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E39BAA74-50A8-4087-8FF8-7C5922121319", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D29C253-B403-4B00-A626-3E3A920DC018", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E9D8FA2-21EA-4384-8001-118DA7C959F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3368DE88-7009-46A0-93F4-4D52BAD3D173", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "26586127-B68B-4476-8182-C49B1B1DCDC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D1EFDCC-983E-4227-9FD5-456C16610BC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "DFA7DBAD-BCA6-47D1-A92E-4EB7941F55F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "02C6C827-97A6-4287-8B3E-DE29054242B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.4.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "9BE4F7C1-BB82-44BA-BBFD-9F660330EC15", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.4.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "E4FCA146-5A72-4746-BE23-63271FBC4D47", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4A0C90BB-C3FE-4A75-B739-0236C4256F7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "46BD9466-0BC9-4B4D-928F-240CD46D306C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "06F456AD-19D3-49EF-82B1-07370F6499AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.5.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "24A9997E-D0DC-45B0-B4DB-308667FA820E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "26202E79-98E0-4533-B4AE-1ABB2477F5A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "C3D7384F-DF1B-4ED7-B1D5-885B95774DDB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F53B8453-F35A-49BE-8129-774BADF71BA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "CCB0C07E-DA2F-4169-848D-C3315CDC1CB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "410C43E6-5912-4C22-A592-7CF94402EEB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D50A355E-1B55-4DD2-8100-EB81AA6FC40E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "9ADF4230-EFEB-45EC-9C96-0262B4A3E459", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "5234531C-F69A-4B94-A480-147734206C5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "321C1066-6800-4488-A7C4-BE91FF738453", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9B51588-50A2-40B2-A007-06F57D38C7AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CDE2B00C-6AC0-4166-8A25-EFC42CE7F737", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "9FD404B4-2B0A-4D7A-8CF6-E2C6B4BACBB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "617FC4AF-D152-4EE1-828D-C2A6AD0DFD3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3A3FE6DC-17FD-4CEE-BDFB-9D4685640381", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8CEEB6C2-0A6D-4434-8446-CB8605CD3B14", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "1548C574-CD51-49F6-91B1-B06C504000E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "7BE4127D-8123-4408-86D3-08168A4501B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8836F348-66DF-43BC-9962-946018D13127", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "1453BB31-D674-4A05-AB2A-2502D127C3E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "868865A1-E074-4DB0-A119-D24C5C53FEF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "1794440C-7068-4673-9142-6221B8A39E5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "C5CF286B-3377-4AE9-A7B9-8535641D639A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "7B3D89C7-909F-419A-9EE8-A1F0D02934EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "50EC8D9D-3483-4080-8000-496343BC8BFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6695F632-6AC4-400F-B513-280304ABC1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "A3423C40-240A-4237-8B0F-A4B4ED421C3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:-:*:*:*:*:*:*", "matchCriteriaId": "03298D9F-CFB8-48F9-BD0C-8A0BEB0760C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "87FCBE6A-C1CD-48EF-A435-4CEADD46C917", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "42E0E639-70A2-41EE-9B34-A9223D1958AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "32E84D64-0CB8-46BF-BD3F-8CA2E0CE4C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A70420A8-8571-4528-98E1-72BE00270C6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "A276363F-F897-4E6D-9D55-5F5AA73DEE26", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "38230656-6242-4D24-AA67-F42A6FA2FC7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "20ED9FC3-5E56-4AE7-903F-267CAE7F2CA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "84F88075-9935-45BF-88B7-21ACE8AAB314", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "DB16D9D6-A2F6-4C4B-B364-1B63B1FFB5F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "283793E4-0AE8-48D9-ABCF-70E44FE55C4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "A0F79D5F-EB28-417A-86DF-053D6EDBA161", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.10.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "4A036F91-70E0-4E97-9896-EEE97BE3C20E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "C92ECBCD-1EE3-498A-B3A4-22BF8EFD2EE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "C4EABFC3-24FA-4441-9F2B-650D90AE5CC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.11.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3DA61A22-3DD0-46A3-8C13-F25F4F03FD35", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "2026FD07-103C-4691-AFA4-88C490382F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.12.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "791700CD-E007-489E-9BC6-37025CAA8144", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "65607103-4284-430A-8212-AC1DCFFFA778", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "4061B4C7-8315-450C-866A-C4F3A6BCB1A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.13.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "C6EA7154-7F08-4E43-9270-E617632230AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "00099DC9-D437-429B-9D08-F0DFA4942A6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.14.0:*:*:*:lts:*:*:*", "matchCriteriaId": "4149F36C-D455-415F-93D7-F92EEE41419D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.14.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "2DC51129-8F38-4505-90FB-4FFDED45BABF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.14.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "4CA571E0-B513-47AA-95BE-EB4DD2AA91E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "89504BDC-82F7-4813-9C1E-456C9ACC6FB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "118C550E-79A8-431E-BADB-710EEEEDC6C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.15.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "96C7950F-41D1-46B5-BA62-E8450CB81244", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.15.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "C9A32ECC-E208-4834-8EF7-FEF7A3495041", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "5DF6BC60-23F5-46A1-83F8-F4BCDEF196EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.16.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "AA3E0D41-2E6E-4294-8E56-1A738A7F9AA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.17.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D16109B8-4CDF-46FC-9AD9-A158E532791B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "9DCAA174-3CA3-49DB-BA19-D2BCF4F8953F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "FD4D1A5A-99A3-4D23-B40C-BBE11EA5B325", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.18.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0F5EE428-98FF-42BC-9F61-311327B8F610", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.19.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CBA2FD08-D761-410F-9804-A76F0DD77349", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.20.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "74B34C21-D90B-4E32-BBA6-7773DB663F18", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.21.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "90996D49-5731-4F7D-9DBE-D0599A5D85A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.21.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D3C91C8D-707D-443D-985F-FA3EDB181208", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "400EA2E1-B178-467F-BBC2-1B2ECEDE662A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E00A6C7-D3CF-40B5-A586-06E09C5AA1A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E25D043-EE0D-49A5-A468-03EDD9CFE0EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.22.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CA17630B-444D-4AE4-B582-F8106C4EEFDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "62A20D6B-62FE-440D-BC58-F764AAA5562B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.23.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "F2AE880B-2FA2-42BB-BEBF-771E18FDA141", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC982D1B-B018-474E-94BE-2157C21276C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "F26815C8-8E43-4C26-947B-986EFFF0ACE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "03E8213E-650F-4C95-B9E5-753E7784EF5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "00B8F794-A7F2-4B8F-B36C-55E61DC6939A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.25.1:*:*:*:*:*:*:*", "matchCriteriaId": "5B7FC3A1-AFB0-4280-BFC5-68F61CFD0AF2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:*:*:*:*", "matchCriteriaId": "322694EF-B086-4BE7-A9F0-41D3A9C245FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc1:*:*:*:*:*:*", "matchCriteriaId": "781AC882-80DD-4176-8E4F-220343B15F68", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc2:*:*:*:*:*:*", "matchCriteriaId": "770CCEEA-B121-454B-BD36-3FC1B262998A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert10:*:*:*:*:*:*", "matchCriteriaId": "5CEBE67E-A3E5-4BC9-8740-4F51123CC9F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert11:*:*:*:*:*:*", "matchCriteriaId": "CD094E25-5E10-4564-9A4D-BE5A14C2815F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert12:*:*:*:*:*:*", "matchCriteriaId": "B6873174-0109-402F-ADCA-B1635F441FD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert13:*:*:*:*:*:*", "matchCriteriaId": "B529CD2F-2958-44E6-839A-3E4FE392B1F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert14:*:*:*:*:*:*", "matchCriteriaId": "B961BF46-DEF7-4804-AF9A-D13F160FA213", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert14_rc1:*:*:*:*:*:*", "matchCriteriaId": "DDC801D4-7A69-4855-8757-24ACE70D784B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert14_rc2:*:*:*:*:*:*", "matchCriteriaId": "60C2B8F0-7722-48B5-89AA-435F52CBC0A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert15:*:*:*:*:*:*", "matchCriteriaId": "B9305CA8-835C-4DFF-9CD8-C1072BACED42", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert16:*:*:*:*:*:*", "matchCriteriaId": "B3729EA6-3949-4854-80D4-DC5587161FBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:*:*:*:*", "matchCriteriaId": "013B1940-C45D-4FE2-8B49-D92B8F1A9048", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:*:*:*:*", "matchCriteriaId": "A98B11B5-B8E2-4903-B4F7-3AC23751AE8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert4:*:*:*:*:*:*", "matchCriteriaId": "C7D60B24-C509-49C3-87A9-49D05CB44183", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert5:*:*:*:*:*:*", "matchCriteriaId": "3C1F9978-44E7-4D39-BEC6-5C6DB7F893E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert6:*:*:*:*:*:*", "matchCriteriaId": "69BA61A8-2A95-4800-BB4E-692BA4321A84", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert7:*:*:*:*:*:*", "matchCriteriaId": "C481D8B0-622D-491D-B292-717B0369B507", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert8:*:*:*:*:*:*", "matchCriteriaId": "BC8390D4-F339-43FF-9F2B-71331D4ECB81", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert9:*:*:*:*:*:*", "matchCriteriaId": "4490B76B-FA41-43DB-9A31-6B3F220F1907", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert1:*:*:*:*:*:*", "matchCriteriaId": "0449B393-FA4E-4664-8E16-BE6B94E4872F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc1:*:*:*:*:*:*", "matchCriteriaId": "2ED8E415-64FA-4E77-A423-3478E606E58E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc2:*:*:*:*:*:*", "matchCriteriaId": "E13CA1DD-B384-4408-B4EC-1AA829981016", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc3:*:*:*:*:*:*", "matchCriteriaId": "EE28BD0A-EA30-4265-A5D6-0390F3558D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc4:*:*:*:*:*:*", "matchCriteriaId": "0F82048D-C65F-4439-BBE4-2D4A9B07EB7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert2:*:*:*:*:*:*", "matchCriteriaId": "6447B77F-3770-4703-9188-B7344ED98E94", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert3:*:*:*:*:*:*", "matchCriteriaId": "5C103924-1D61-4090-8ED5-4731371B2B2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.13:cert4:*:*:*:*:*:*", "matchCriteriaId": "08F87B09-3867-4CAE-BAD7-2206CD6CAF97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Asterisk 11.x before 11.25.3, 13.x before 13.17.2, and 14.x before 14.6.2 and Certified Asterisk 11.x before 11.6-cert18 and 13.x before 13.13-cert6, insufficient RTCP packet validation could allow reading stale buffer contents and when combined with the \"nat\" and \"symmetric_rtp\" options allow redirecting where Asterisk sends the next RTCP report." }, { "lang": "es", "value": "En Asterisk enversiones 11.x anteriores a la 11.25.3, versiones 13.x anteriores a la 13.17.2 y versiones 14.x anteriores a la 14.6.2; y en Certified Asterisk en versiones 11.x anteriores a la 11.6-cert18 y versiones 13.x anteriores a la 13.13-cert6, una validaci\u00f3n insuficiente de paquetes RTCP podr\u00eda permitir la lectura de contenidos obsoletos del b\u00fafer y, cuando se combina con las opciones \"nat\" y \"symmetric_rtp\", permite las redirecciones en las que Asterisk env\u00eda el siguiente informe RTCP." } ], "id": "CVE-2017-14603", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-10-10T01:30:21.860", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2017-008.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2017/dsa-3990" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27274" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2017-008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2017/dsa-3990" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27274" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-12-12 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
Double free vulnerability in the WebSocket Server (res_http_websocket module) in Asterisk Open Source 11.x before 11.14.2, 12.x before 12.7.2, and 13.x before 13.0.2 and Certified Asterisk 11.6 before 11.6-cert9 allows remote attackers to cause a denial of service (crash) by sending a zero length frame after a non-zero length frame.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:lts:*:*:*", "matchCriteriaId": "6AD7C9B3-D029-4E05-8E80-3ADA904FAC1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:lts:*:*:*", "matchCriteriaId": "CE71221B-4D55-4643-B6D1-307B2CF41F98", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:lts:*:*:*", "matchCriteriaId": "88124275-9BEB-4D53-9E4D-1AC8C52F2D0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert4:*:*:lts:*:*:*", "matchCriteriaId": "4F3CEFEF-72B6-4B58-81FE-01BCEEFB3013", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert5:*:*:lts:*:*:*", "matchCriteriaId": "AA637187-0EAE-4756-AD72-A0B2FABCA070", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert6:*:*:lts:*:*:*", "matchCriteriaId": "6DAF6784-0B31-4104-9D85-473D5AFAB785", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert7:*:*:lts:*:*:*", "matchCriteriaId": "77B06B83-D62C-4A0E-BE94-83C9A02CE55A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert8:*:*:lts:*:*:*", "matchCriteriaId": "CAD17809-CBB1-4E41-99C9-20FE56853563", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6.0:*:*:*:lts:*:*:*", "matchCriteriaId": "D6EE9895-FB94-451D-8701-8C0DD8F5BED0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F53B8453-F35A-49BE-8129-774BADF71BA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "CCB0C07E-DA2F-4169-848D-C3315CDC1CB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "410C43E6-5912-4C22-A592-7CF94402EEB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D50A355E-1B55-4DD2-8100-EB81AA6FC40E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "9ADF4230-EFEB-45EC-9C96-0262B4A3E459", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9B51588-50A2-40B2-A007-06F57D38C7AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CDE2B00C-6AC0-4166-8A25-EFC42CE7F737", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "9FD404B4-2B0A-4D7A-8CF6-E2C6B4BACBB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "617FC4AF-D152-4EE1-828D-C2A6AD0DFD3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F31715AF-5A35-4D0B-8E01-BB6E4CB7E02F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "1548C574-CD51-49F6-91B1-B06C504000E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D56C2C11-4B42-43AB-9DAE-61C15D107160", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "69F2DED4-39F5-44C8-BEA3-22692D28C631", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "AD172E70-238B-4B01-A922-8021B5627092", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "C689A32B-E87D-492F-B3F6-7B80DFA049C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5FB3863D-7F46-4C4A-9E6B-C255CDF0D953", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "7239304D-C383-4F26-BB08-65ADD2380015", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "1AC153C2-258E-4EE6-845F-8E8C68AA242D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "1453BB31-D674-4A05-AB2A-2502D127C3E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "229B7982-9775-42AA-B8F5-FE920CCAA497", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "326845DF-2DB2-406B-BE0F-877384DAACFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.5.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E0FC2D46-FD1B-421F-8773-BB41B1E9A831", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "868865A1-E074-4DB0-A119-D24C5C53FEF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "1794440C-7068-4673-9142-6221B8A39E5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "C5CF286B-3377-4AE9-A7B9-8535641D639A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "50EC8D9D-3483-4080-8000-496343BC8BFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6695F632-6AC4-400F-B513-280304ABC1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "A3423C40-240A-4237-8B0F-A4B4ED421C3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "24F62C78-2913-463F-B689-353AB2371E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "87FCBE6A-C1CD-48EF-A435-4CEADD46C917", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "42E0E639-70A2-41EE-9B34-A9223D1958AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "32E84D64-0CB8-46BF-BD3F-8CA2E0CE4C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "A276363F-F897-4E6D-9D55-5F5AA73DEE26", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "38230656-6242-4D24-AA67-F42A6FA2FC7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "20ED9FC3-5E56-4AE7-903F-267CAE7F2CA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "84F88075-9935-45BF-88B7-21ACE8AAB314", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "DB16D9D6-A2F6-4C4B-B364-1B63B1FFB5F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "283793E4-0AE8-48D9-ABCF-70E44FE55C4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "C4EABFC3-24FA-4441-9F2B-650D90AE5CC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.11.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3DA61A22-3DD0-46A3-8C13-F25F4F03FD35", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "2026FD07-103C-4691-AFA4-88C490382F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.12.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "791700CD-E007-489E-9BC6-37025CAA8144", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "4061B4C7-8315-450C-866A-C4F3A6BCB1A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.13.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "C6EA7154-7F08-4E43-9270-E617632230AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "EC6047FB-D1BD-4E21-B6BC-E51374C4B0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.14.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "2DC51129-8F38-4505-90FB-4FFDED45BABF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.14.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "4CA571E0-B513-47AA-95BE-EB4DD2AA91E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B446105E-6C8E-495A-BF83-A33CB33485A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "0B53364B-5278-46E9-961A-192CA334CB09", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3B4D6D24-A718-4962-AD4E-F19AFB03BFF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "BE2F0D0D-761C-4338-93F0-506E94E57000", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "3D38DFCA-E357-4A28-8F03-FDADF40A5185", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F42C9442-9EBC-4CA5-AB1C-BA0662C27BDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "71762B58-A08B-405B-9596-6D15CF4A95D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "EA48C05A-E898-42EE-A699-94BBD66E5E0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "EDCB78F8-AAC8-44B1-BDF4-C73BC8951EC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D92FFF6-E7B2-4210-A652-79AC6B74002C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "DB5E92FB-9CF8-461E-A665-3407D265DF17", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "536F6C10-3165-40F7-931A-23765AB87555", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "133288EC-8A78-4C9D-BF94-9900CD3D2260", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B2E54998-B257-478E-9E52-2BB4F4CD6429", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "5FD4498A-72BD-40EB-A332-DE10C87C1015", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "71961599-009C-42F4-AA26-9B16C39F3CBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B98A2EA6-DCC6-4F8B-B132-6692AED16CF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "672EDC0E-D70A-4BB0-B7FE-5D422C737862", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "D41387EE-E8B6-4B4F-BC52-7FED09322A20", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "8E9E50F8-0123-4C9E-88E1-5DCE08770B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F7C605A3-8517-4215-9AD3-980D587B22DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "866815AE-D1FE-460C-A3BC-70C251655C1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "7B635C21-C193-43AF-A139-98604F324ABF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FB2C4E1E-6B90-4DCC-BC09-7D19FBA65C3F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Double free vulnerability in the WebSocket Server (res_http_websocket module) in Asterisk Open Source 11.x before 11.14.2, 12.x before 12.7.2, and 13.x before 13.0.2 and Certified Asterisk 11.6 before 11.6-cert9 allows remote attackers to cause a denial of service (crash) by sending a zero length frame after a non-zero length frame." }, { "lang": "es", "value": "Vulnerabilidad de doble liberaci\u00f3n en WebSocket Server (el m\u00f3dulo res_http_websocket) en Asterisk Open Source 11.x anterior a 11.14.2, 12.x anterior a 12.7.2, y 13.x anterior a 13.0.2 y Certified Asterisk 11.6 anterior a 11.6-cert9 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) mediante el envio de un Frame de longitud cero despu\u00e9s de un Frame de longitud no cero." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/415.html\"\u003eCWE-415: Double Free\u003c/a\u003e", "id": "CVE-2014-9374", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-12-12T15:59:14.883", "references": [ { "source": "cve@mitre.org", "url": "http://advisories.mageia.org/MGASA-2015-0010.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-019.html" }, { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/129473/Asterisk-Project-Security-Advisory-AST-2014-019.html" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2014/Dec/48" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/60251" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:018" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/534197/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/71607" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1031345" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://advisories.mageia.org/MGASA-2015-0010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/129473/Asterisk-Project-Security-Advisory-AST-2014-019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2014/Dec/48" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/60251" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:018" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/534197/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/71607" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1031345" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-04-18 22:14
Modified
2025-04-12 10:46
Severity ?
Summary
res/res_pjsip_exten_state.c in the PJSIP channel driver in Asterisk Open Source 12.x before 12.1.0 allows remote authenticated users to cause a denial of service (crash) via a SUBSCRIBE request without any Accept headers, which triggers an invalid pointer dereference.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B446105E-6C8E-495A-BF83-A33CB33485A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3B4D6D24-A718-4962-AD4E-F19AFB03BFF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "BE2F0D0D-761C-4338-93F0-506E94E57000", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "3D38DFCA-E357-4A28-8F03-FDADF40A5185", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "res/res_pjsip_exten_state.c in the PJSIP channel driver in Asterisk Open Source 12.x before 12.1.0 allows remote authenticated users to cause a denial of service (crash) via a SUBSCRIBE request without any Accept headers, which triggers an invalid pointer dereference." }, { "lang": "es", "value": "res/res_pjsip_exten_state.c en el controlador de canal PJSIP en Asterisk Open Source 12.x anterior a 12.1.0 permite a usuarios remotos autenticados causar una denegaci\u00b4\u00b4on de servicio (ca\u00edda) a trav\u00e9s de una solicitud SUBSCRIBE sin cabeceras Accept, lo que provoca una referencia de puntero invalida." } ], "id": "CVE-2014-2289", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-04-18T22:14:38.137", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-004-12.diff" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-004.html" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130400.html" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130426.html" }, { "source": "cve@mitre.org", "url": "https://issues.asterisk.org/jira/browse/ASTERISK-23139" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-004-12.diff" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130400.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130426.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.asterisk.org/jira/browse/ASTERISK-23139" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-11-26 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
Asterisk Open Source 11.x before 11.12.1 and 12.x before 12.5.1 and Certified Asterisk 11.6 before 11.6-cert6, when using the res_fax_spandsp module, allows remote authenticated users to cause a denial of service (crash) via an out of call message, which is not properly handled in the ReceiveFax dialplan application.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://downloads.asterisk.org/pub/security/AST-2014-010.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://downloads.asterisk.org/pub/security/AST-2014-010.html | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:lts:*:*:*", "matchCriteriaId": "6AD7C9B3-D029-4E05-8E80-3ADA904FAC1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:lts:*:*:*", "matchCriteriaId": "CE71221B-4D55-4643-B6D1-307B2CF41F98", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:lts:*:*:*", "matchCriteriaId": "88124275-9BEB-4D53-9E4D-1AC8C52F2D0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert4:*:*:lts:*:*:*", "matchCriteriaId": "4F3CEFEF-72B6-4B58-81FE-01BCEEFB3013", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert5:*:*:lts:*:*:*", "matchCriteriaId": "AA637187-0EAE-4756-AD72-A0B2FABCA070", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6.0:*:*:*:lts:*:*:*", "matchCriteriaId": "D6EE9895-FB94-451D-8701-8C0DD8F5BED0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F53B8453-F35A-49BE-8129-774BADF71BA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "CCB0C07E-DA2F-4169-848D-C3315CDC1CB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "410C43E6-5912-4C22-A592-7CF94402EEB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D50A355E-1B55-4DD2-8100-EB81AA6FC40E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "9ADF4230-EFEB-45EC-9C96-0262B4A3E459", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9B51588-50A2-40B2-A007-06F57D38C7AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CDE2B00C-6AC0-4166-8A25-EFC42CE7F737", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "9FD404B4-2B0A-4D7A-8CF6-E2C6B4BACBB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "617FC4AF-D152-4EE1-828D-C2A6AD0DFD3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F31715AF-5A35-4D0B-8E01-BB6E4CB7E02F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "1548C574-CD51-49F6-91B1-B06C504000E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D56C2C11-4B42-43AB-9DAE-61C15D107160", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "69F2DED4-39F5-44C8-BEA3-22692D28C631", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "AD172E70-238B-4B01-A922-8021B5627092", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "C689A32B-E87D-492F-B3F6-7B80DFA049C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5FB3863D-7F46-4C4A-9E6B-C255CDF0D953", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "7239304D-C383-4F26-BB08-65ADD2380015", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "1AC153C2-258E-4EE6-845F-8E8C68AA242D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "1453BB31-D674-4A05-AB2A-2502D127C3E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "229B7982-9775-42AA-B8F5-FE920CCAA497", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "326845DF-2DB2-406B-BE0F-877384DAACFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.5.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E0FC2D46-FD1B-421F-8773-BB41B1E9A831", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "868865A1-E074-4DB0-A119-D24C5C53FEF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "1794440C-7068-4673-9142-6221B8A39E5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "C5CF286B-3377-4AE9-A7B9-8535641D639A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "50EC8D9D-3483-4080-8000-496343BC8BFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6695F632-6AC4-400F-B513-280304ABC1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "A3423C40-240A-4237-8B0F-A4B4ED421C3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "24F62C78-2913-463F-B689-353AB2371E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "87FCBE6A-C1CD-48EF-A435-4CEADD46C917", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "42E0E639-70A2-41EE-9B34-A9223D1958AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "32E84D64-0CB8-46BF-BD3F-8CA2E0CE4C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "A276363F-F897-4E6D-9D55-5F5AA73DEE26", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "38230656-6242-4D24-AA67-F42A6FA2FC7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "20ED9FC3-5E56-4AE7-903F-267CAE7F2CA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "84F88075-9935-45BF-88B7-21ACE8AAB314", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "DB16D9D6-A2F6-4C4B-B364-1B63B1FFB5F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "283793E4-0AE8-48D9-ABCF-70E44FE55C4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "C4EABFC3-24FA-4441-9F2B-650D90AE5CC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.11.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3DA61A22-3DD0-46A3-8C13-F25F4F03FD35", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "2026FD07-103C-4691-AFA4-88C490382F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B446105E-6C8E-495A-BF83-A33CB33485A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "0B53364B-5278-46E9-961A-192CA334CB09", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3B4D6D24-A718-4962-AD4E-F19AFB03BFF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "BE2F0D0D-761C-4338-93F0-506E94E57000", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "3D38DFCA-E357-4A28-8F03-FDADF40A5185", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F42C9442-9EBC-4CA5-AB1C-BA0662C27BDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "71762B58-A08B-405B-9596-6D15CF4A95D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "EA48C05A-E898-42EE-A699-94BBD66E5E0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "EDCB78F8-AAC8-44B1-BDF4-C73BC8951EC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D92FFF6-E7B2-4210-A652-79AC6B74002C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "DB5E92FB-9CF8-461E-A665-3407D265DF17", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "536F6C10-3165-40F7-931A-23765AB87555", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "133288EC-8A78-4C9D-BF94-9900CD3D2260", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B2E54998-B257-478E-9E52-2BB4F4CD6429", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "5FD4498A-72BD-40EB-A332-DE10C87C1015", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "71961599-009C-42F4-AA26-9B16C39F3CBC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Asterisk Open Source 11.x before 11.12.1 and 12.x before 12.5.1 and Certified Asterisk 11.6 before 11.6-cert6, when using the res_fax_spandsp module, allows remote authenticated users to cause a denial of service (crash) via an out of call message, which is not properly handled in the ReceiveFax dialplan application." }, { "lang": "es", "value": "Asterisk Open Source 11.x anterior a 11.12.1 y 12.x anterior a 12.5.1 y Certified Asterisk 11.6 anterior a 11.6-cert6, cuando utilizan el m\u00f3dulo res_fax_spandsp, permiten a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de un mensaje fuera de llamada (out of call), lo que no se maneja correctamente en la aplicaci\u00f3n ReceiveFax dialplan." } ], "id": "CVE-2014-6610", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-11-26T15:59:02.573", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-010.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-19" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-11-24 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
Use-after-free vulnerability in the PJSIP channel driver in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1, when using the res_pjsip_refer module, allows remote attackers to cause a denial of service (crash) via an in-dialog INVITE with Replaces message, which triggers the channel to be hung up.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "F21F0B73-A30F-4673-B3A8-D9F456FFCEF2", "versionEndExcluding": "12.7.1", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C83CD93-7CBA-4FF0-B29E-A509F4A3D5E2", "versionEndExcluding": "13.0.1", "versionStartIncluding": "13.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in the PJSIP channel driver in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1, when using the res_pjsip_refer module, allows remote attackers to cause a denial of service (crash) via an in-dialog INVITE with Replaces message, which triggers the channel to be hung up." }, { "lang": "es", "value": "Vulnerabilidad de uso despu\u00e9s de liberaci\u00f3n en el controlador de canales PJSIP en Asterisk Open Source 12.x anterior a 12.7.1 y 13.x anterior a 13.0.1, cuando utiliza el m\u00f3dulo res_pjsip_refer, permite a atacantes remotosw causar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de un in-dialog INVITE con mensaje Replaces, lo que provoca el cuelgue del canal." } ], "id": "CVE-2014-8416", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-11-24T15:59:08.343", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-016.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-10-12 23:17
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple buffer overflows in the voicemail functionality in Asterisk 1.4.x before 1.4.13, when using IMAP storage, might allow (1) remote attackers to execute arbitrary code via a long combination of Content-type and Content-description headers, or (2) local users to execute arbitrary code via a long combination of astspooldir, voicemail context, and voicemail mailbox fields. NOTE: vector 2 requires write access to Asterisk configuration files.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "600A8B6A-B929-455F-AB6C-548712F45A44", "versionEndIncluding": "1.4.12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in the voicemail functionality in Asterisk 1.4.x before 1.4.13, when using IMAP storage, might allow (1) remote attackers to execute arbitrary code via a long combination of Content-type and Content-description headers, or (2) local users to execute arbitrary code via a long combination of astspooldir, voicemail context, and voicemail mailbox fields. NOTE: vector 2 requires write access to Asterisk configuration files." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer en la funcionalidad de voicemail del Asterisk 1.4.x anterior al 1.4.13, cuando se utiliza el almacenamiento IMAP, puede permitir (1) a atacantes ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una combinaci\u00f3n larga de cabeceras dependientes del tipo (Content-type) y de la descripci\u00f3n (Content-description), o (2) usuarios locales ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una combinaci\u00f3n larga de los campos astspooldir, voicemail context y voicemail mailbox. NOTA: el vector 2 requiere acceso de escritura en los ficheros de configuraci\u00f3n del Asterisk." } ], "id": "CVE-2007-5358", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-10-12T23:17:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://downloads.digium.com/pub/security/AST-2007-022.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/38201" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/38202" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/27184" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/481996/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/26005" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018804" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/3454" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37051" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37052" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://downloads.digium.com/pub/security/AST-2007-022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/38201" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/38202" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/27184" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/481996/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/26005" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018804" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/3454" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37051" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37052" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-04-15 05:15
Modified
2024-11-21 06:54
Severity ?
Summary
An SSRF issue was discovered in Asterisk through 19.x. When using STIR/SHAKEN, it's possible to send arbitrary requests (such as GET) to interfaces such as localhost by using the Identity header. This is fixed in 16.25.2, 18.11.2, and 19.3.2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digium | asterisk | * | |
digium | asterisk | * | |
digium | asterisk | * | |
debian | debian_linux | 10.0 | |
debian | debian_linux | 11.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8AB56FA-AEC6-4A6F-B420-DDBF3390379B", "versionEndIncluding": "16.25.1", "versionStartIncluding": "16.15.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "496A20DA-23D7-435B-8EA9-3AC585DAAB72", "versionEndExcluding": "18.11.2", "versionStartIncluding": "18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "C25BFFCA-90FE-475D-88A7-3BC281B830AF", "versionEndIncluding": "19.3.1", "versionStartIncluding": "19.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An SSRF issue was discovered in Asterisk through 19.x. When using STIR/SHAKEN, it\u0027s possible to send arbitrary requests (such as GET) to interfaces such as localhost by using the Identity header. This is fixed in 16.25.2, 18.11.2, and 19.3.2." }, { "lang": "es", "value": "Se ha detectado un problema de tipo SSRF en Asterisk versiones hasta 19.x. Cuando es usado STIR/SHAKEN, es posible enviar peticiones arbitrarias (como GET) a interfaces como localhost usando el encabezado Identity. Esto ha sido corregido en versiones 16.25.2, 18.11.2 y 19.3.2" } ], "id": "CVE-2022-26499", "lastModified": "2024-11-21T06:54:03.990", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-15T05:15:06.640", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/166745/Asterisk-Project-Security-Advisory-AST-2022-002.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/AST-2022-002.html" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/166745/Asterisk-Project-Security-Advisory-AST-2022-002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/AST-2022-002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5285" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-918" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-09-18 18:55
Modified
2025-04-11 00:51
Severity ?
Summary
Stack-based buffer overflow in the milliwatt_generate function in the Miliwatt application in Asterisk 1.4.x before 1.4.44, 1.6.x before 1.6.2.23, 1.8.x before 1.8.10.1, and 10.x before 10.2.1, when the o option is used and the internal_timing option is off, allows remote attackers to cause a denial of service (application crash) via a large number of samples in an audio packet.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "83BEEFED-03F9-4E63-B348-41D2A112D124", "versionEndExcluding": "1.4.44", "versionStartIncluding": "1.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "A847AF83-3D35-42A6-A994-23E8D9C64379", "versionEndExcluding": "1.6.2.23", "versionStartIncluding": "1.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEB0F939-6D71-415D-88B3-1654DEB80671", "versionEndExcluding": "1.8.10.1", "versionStartIncluding": "1.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "36CEACD4-5FB6-44BA-B402-6CB4BA2EA4D6", "versionEndExcluding": "10.2.1", "versionStartIncluding": "10.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the milliwatt_generate function in the Miliwatt application in Asterisk 1.4.x before 1.4.44, 1.6.x before 1.6.2.23, 1.8.x before 1.8.10.1, and 10.x before 10.2.1, when the o option is used and the internal_timing option is off, allows remote attackers to cause a denial of service (application crash) via a large number of samples in an audio packet." }, { "lang": "es", "value": "Vulnerabilidad de desboramiento de buffer basado en memoria din\u00e1mica en la funci\u00f3n milliwatt_generate en main/utils.c en Asterisk Asterisk v1.4.x antes de v1.4.44, v1.6.x antes de v1.6.2.23, v1.8.x antes de v1.8.10.1, and v10.x antes de v10.2.1, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una gran n\u00famero de muestras en un paquete de audio." } ], "id": "CVE-2012-1183", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-09-18T18:55:04.210", "references": [ { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-03/0069.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2012-002-1.8.diff" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2012-002.pdf" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://osvdb.org/80125" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/48417" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/48941" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1026812" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.asterisk.org/node/51797" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2012/dsa-2460" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/16/10" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/16/17" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/52523" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74082" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-03/0069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2012-002-1.8.diff" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2012-002.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://osvdb.org/80125" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/48417" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/48941" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1026812" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.asterisk.org/node/51797" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2012/dsa-2460" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/16/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/16/17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/52523" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74082" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-06-17 14:55
Modified
2025-04-12 10:46
Severity ?
Summary
The PJSIP Channel Driver in Asterisk Open Source before 12.3.1 allows remote attackers to cause a denial of service (deadlock) by terminating a subscription request before it is complete, which triggers a SIP transaction timeout.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digium | asterisk | * | |
digium | asterisk | 12.0.0 | |
digium | asterisk | 12.1.0 | |
digium | asterisk | 12.1.0 | |
digium | asterisk | 12.1.0 | |
digium | asterisk | 12.1.0 | |
digium | asterisk | 12.1.1 | |
digium | asterisk | 12.2.0 | |
digium | asterisk | 12.2.0 | |
digium | asterisk | 12.2.0 | |
digium | asterisk | 12.2.0 | |
digium | asterisk | 12.3.0 | |
digium | asterisk | 12.3.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "63CB4F59-5EE5-4767-8303-090CCF64C185", "versionEndIncluding": "12.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B446105E-6C8E-495A-BF83-A33CB33485A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:-:*:*:*:*:*:*", "matchCriteriaId": "F3DE062D-4E87-4691-A664-D9E7C02036EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3B4D6D24-A718-4962-AD4E-F19AFB03BFF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "BE2F0D0D-761C-4338-93F0-506E94E57000", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "3D38DFCA-E357-4A28-8F03-FDADF40A5185", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "B3CD4A85-26FB-4AE5-9CB7-4DF38DF32482", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F42C9442-9EBC-4CA5-AB1C-BA0662C27BDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "71762B58-A08B-405B-9596-6D15CF4A95D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "EA48C05A-E898-42EE-A699-94BBD66E5E0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "EDCB78F8-AAC8-44B1-BDF4-C73BC8951EC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "DB5E92FB-9CF8-461E-A665-3407D265DF17", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "536F6C10-3165-40F7-931A-23765AB87555", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The PJSIP Channel Driver in Asterisk Open Source before 12.3.1 allows remote attackers to cause a denial of service (deadlock) by terminating a subscription request before it is complete, which triggers a SIP transaction timeout." }, { "lang": "es", "value": "El controlador de canales PJSIP en Asterisk Open Source anterior a 12.3.1 permite a atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo) mediante la terminaci\u00f3n de una solicitud de suscripci\u00f3n antes de que se haya completado, lo que provoca un timeout de la transacci\u00f3n SIP." } ], "id": "CVE-2014-4048", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-06-17T14:55:08.017", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-008.html" }, { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/127090/Asterisk-Project-Security-Advisory-AST-2014-008.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/532416/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/127090/Asterisk-Project-Security-Advisory-AST-2014-008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/532416/100/0/threaded" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-11-26 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
The res_pjsip_pubsub module in Asterisk Open Source 12.x before 12.5.1 allows remote authenticated users to cause a denial of service (crash) via crafted headers in a SIP SUBSCRIBE request for an event package.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://downloads.asterisk.org/pub/security/AST-2014-009.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://downloads.asterisk.org/pub/security/AST-2014-009.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digium | asterisk | 12.0.0 | |
digium | asterisk | 12.1.0 | |
digium | asterisk | 12.1.0 | |
digium | asterisk | 12.1.0 | |
digium | asterisk | 12.1.0 | |
digium | asterisk | 12.2.0 | |
digium | asterisk | 12.2.0 | |
digium | asterisk | 12.2.0 | |
digium | asterisk | 12.2.0 | |
digium | asterisk | 12.3.0 | |
digium | asterisk | 12.3.0 | |
digium | asterisk | 12.3.0 | |
digium | asterisk | 12.4.0 | |
digium | asterisk | 12.4.0 | |
digium | asterisk | 12.5.0 | |
digium | asterisk | 12.5.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B446105E-6C8E-495A-BF83-A33CB33485A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "0B53364B-5278-46E9-961A-192CA334CB09", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3B4D6D24-A718-4962-AD4E-F19AFB03BFF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "BE2F0D0D-761C-4338-93F0-506E94E57000", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "3D38DFCA-E357-4A28-8F03-FDADF40A5185", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F42C9442-9EBC-4CA5-AB1C-BA0662C27BDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "71762B58-A08B-405B-9596-6D15CF4A95D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "EA48C05A-E898-42EE-A699-94BBD66E5E0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "EDCB78F8-AAC8-44B1-BDF4-C73BC8951EC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D92FFF6-E7B2-4210-A652-79AC6B74002C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "DB5E92FB-9CF8-461E-A665-3407D265DF17", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "536F6C10-3165-40F7-931A-23765AB87555", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "133288EC-8A78-4C9D-BF94-9900CD3D2260", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B2E54998-B257-478E-9E52-2BB4F4CD6429", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "5FD4498A-72BD-40EB-A332-DE10C87C1015", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "71961599-009C-42F4-AA26-9B16C39F3CBC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The res_pjsip_pubsub module in Asterisk Open Source 12.x before 12.5.1 allows remote authenticated users to cause a denial of service (crash) via crafted headers in a SIP SUBSCRIBE request for an event package." }, { "lang": "es", "value": "El m\u00f3dulo res_pjsip_pubsub en Asterisk Open Source 12.x anterior a 12.5.1 permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de cabeceras manipuladas en una solicitud SIP SUBSCRIBE para un paquete de eventos." } ], "id": "CVE-2014-6609", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-11-26T15:59:01.447", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-009.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-009.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-07-30 20:00
Modified
2025-04-09 00:30
Severity ?
Summary
main/rtp.c in Asterisk Open Source 1.6.1 before 1.6.1.2 allows remote attackers to cause a denial of service (crash) via an RTP text frame without a certain delimiter, which triggers a NULL pointer dereference and the subsequent calculation of an invalid pointer.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "DBFF2686-0F5C-4F20-AA93-6B63C5ADCD82", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "main/rtp.c in Asterisk Open Source 1.6.1 before 1.6.1.2 allows remote attackers to cause a denial of service (crash) via an RTP text frame without a certain delimiter, which triggers a NULL pointer dereference and the subsequent calculation of an invalid pointer." }, { "lang": "es", "value": "main/rtp.c en Asterisk Open Source v1.6.1 anterior v1.6.1.2, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de un marco de texto RTP sin un determinado delimitador, lo que provoca una deferencia a puntero NULL y su consecuente c\u00e1lculo no v\u00e1lido de puntero." } ], "id": "CVE-2009-2651", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-07-30T20:00:00.360", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2009-004.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://downloads.digium.com/pub/security/AST-2009-004-1.6.1.diff.txt" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/56571" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36039" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/35837" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1022608" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/2067" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52046" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2009-004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://downloads.digium.com/pub/security/AST-2009-004-1.6.1.diff.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/56571" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36039" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/35837" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1022608" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/2067" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52046" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" }, { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-12-02 11:30
Modified
2025-04-09 00:30
Severity ?
Summary
rtp.c in Asterisk Open Source 1.2.x before 1.2.37, 1.4.x before 1.4.27.1, 1.6.0.x before 1.6.0.19, and 1.6.1.x before 1.6.1.11; Business Edition B.x.x before B.2.5.13, C.2.x.x before C.2.4.6, and C.3.x.x before C.3.2.3; and s800i 1.3.x before 1.3.0.6 allows remote attackers to cause a denial of service (daemon crash) via an RTP comfort noise payload with a long data length.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "39358795-09A6-44C6-B969-1560CEF40057", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "8C2DAB51-91ED-43D4-AEA9-7C4661089BAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "A596A018-2FBC-4CEB-9910-756CC6598679", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "14BDCF8E-0B68-430A-A463-EE40C1A9AD65", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "CA2CD93E-71A5-49EC-B986-5868C05553EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "2B66B213-4397-4435-8E48-8ED69AAE13D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "55131A3D-C892-44EC-83D6-5888C57B11A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.2:netsec:*:*:*:*:*:*", "matchCriteriaId": "E017DD53-B8EC-4EA2-BF59-18C075C5771D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B940EEC6-4451-42B9-A56D-BDB8801B3685", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.3:netsec:*:*:*:*:*:*", "matchCriteriaId": "CE4AB19F-1338-466D-AAD8-584C79FED1AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "175954A5-E712-41B8-BC11-4F999343063D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.10:netsec:*:*:*:*:*:*", "matchCriteriaId": "FF5A2AA3-BB1F-4DEA-A369-183877BBDAC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "1DF9E41E-8FE6-4396-A5D4-D4568600FE03", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.11:netsec:*:*:*:*:*:*", "matchCriteriaId": "7B43C508-91E3-49C9-86F0-3643D8F2B7F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "4457486F-E9B4-46B8-A05D-3B32F8B639A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.12:netsec:*:*:*:*:*:*", "matchCriteriaId": "0831E658-36AB-4A4B-9929-3DB6BE855A3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "69417F54-D92F-46FB-9BFA-995211279C0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.12.1:netsec:*:*:*:*:*:*", "matchCriteriaId": "46A770C7-A7D4-44E3-A8B4-AC2189EAC3DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "4611BEA0-25EC-4705-A390-6DF678373FF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.13:netsec:*:*:*:*:*:*", "matchCriteriaId": "4BCD1F97-4B56-4DA8-A6EC-FA42A3CB9B97", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "53022458-F443-4402-AC52-FC3AE810E89E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "120B85AA-E9B8-4A4D-81CE-FD36CDB63074", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.15:netsec:*:*:*:*:*:*", "matchCriteriaId": "64D94742-7CA1-487B-90E8-5063FBF88925", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "12302460-5D3F-4045-9DBF-606562E03BDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.16:netsec:*:*:*:*:*:*", "matchCriteriaId": "78546FDF-C843-4E48-ABEE-CC3514AA7C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "8D6EBC0B-9842-44D1-B9D6-EFB88BE22879", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.17:netsec:*:*:*:*:*:*", "matchCriteriaId": "052969F1-6758-46E8-9273-E0F872BD65BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "624A0F00-4629-4550-847F-F24CC93DFF2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.18:netsec:*:*:*:*:*:*", "matchCriteriaId": "E473F645-F8B0-43FE-957B-F053427465DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "10FC9AAB-1FAD-4953-A2FC-D42E9687D27E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.19:netsec:*:*:*:*:*:*", "matchCriteriaId": "460C9907-AA19-402A-85DE-D3CEA98B107B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "CD80F0D6-6B5B-41D3-AC41-F1643865088A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.20:netsec:*:*:*:*:*:*", "matchCriteriaId": "734D5198-53C1-40D3-B5BF-D74FC71FD3BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.21:*:*:*:*:*:*:*", "matchCriteriaId": "788DEF5E-8A99-463D-89DC-0CC032271554", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.21:netsec:*:*:*:*:*:*", "matchCriteriaId": "C0996D7A-9419-4897-A0AF-498AC3A2A81F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "62D670E6-47E5-4B40-9217-F97D5F39C3EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.21.1:netsec:*:*:*:*:*:*", "matchCriteriaId": "94C23DB8-3C92-40FE-B8A6-ADF84D28510E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "A6CE7E4E-DA2D-4F03-A226-92965B40AE34", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.22:netsec:*:*:*:*:*:*", "matchCriteriaId": "0C59A947-457E-47EB-832E-3DA70CB52695", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.23:*:*:*:*:*:*:*", "matchCriteriaId": "55F74B56-B412-4AF1-AED0-C948AB6DC829", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.23:netsec:*:*:*:*:*:*", "matchCriteriaId": "3B50ADDB-D3C2-407D-8844-F93866E5F20C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.24:*:*:*:*:*:*:*", "matchCriteriaId": "2775A7CC-2D88-4F2D-8C26-1E0DDDD681E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.24:netsec:*:*:*:*:*:*", "matchCriteriaId": "F4149B59-E773-4ED8-A71D-EB7D00808819", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.25:*:*:*:*:*:*:*", "matchCriteriaId": "5A0408C3-0FA7-4A17-9451-C4D46CDA8F27", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.25:netsec:*:*:*:*:*:*", "matchCriteriaId": "1726090D-0C37-44A4-AD9B-7ED733B8702D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.26:*:*:*:*:*:*:*", "matchCriteriaId": "B92B045B-8CD6-4C04-9CCB-DCE9A44F6C12", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.26:netsec:*:*:*:*:*:*", "matchCriteriaId": "54354E16-3238-43E8-BAA9-93CA7EB44D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.26.1:*:*:*:*:*:*:*", "matchCriteriaId": "6867EED4-FC3B-4B72-88A5-DED96C729FE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.26.1:netsec:*:*:*:*:*:*", "matchCriteriaId": "1A0867FC-7161-433F-A416-D7207C8D4D36", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.26.2:*:*:*:*:*:*:*", "matchCriteriaId": "97BE6B60-3276-4580-843B-743D0D71E3DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.26.2:netsec:*:*:*:*:*:*", "matchCriteriaId": "36491B32-A405-4C5B-938F-9BEA50A8AF16", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.27:*:*:*:*:*:*:*", "matchCriteriaId": "6141909B-EBC4-4726-AE9F-669C31257A5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.28:*:*:*:*:*:*:*", "matchCriteriaId": "754A51AC-EF20-4736-ADDB-D2A70BCB79EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "4600BB66-6DEB-444B-AF9E-BDD06CFD2876", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.29:*:*:*:*:*:*:*", "matchCriteriaId": "EE089E31-3521-4D12-B81C-B6E386AE1409", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "FFE86E95-1110-46DF-9A7A-0E1AA56ACE4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.30.1:*:*:*:*:*:*:*", "matchCriteriaId": "5B6DF5C5-85B4-4595-A69B-1DE70B5E0E41", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.30.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F5E9888-16CD-4DB2-8889-CE4477559C71", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.30.3:*:*:*:*:*:*:*", "matchCriteriaId": "C29C9A2C-6435-444E-A20B-5881F3798B85", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.30.4:*:*:*:*:*:*:*", "matchCriteriaId": "E77A2569-CFAE-498D-A633-803849CFECE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "D16E88E6-42D0-400E-AF43-111B35CE11E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.31.1:*:*:*:*:*:*:*", "matchCriteriaId": "AE15A42E-030B-48F0-9498-1755DAAEDFB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.32:*:*:*:*:*:*:*", "matchCriteriaId": "39511726-1202-4179-9708-4D3B28496768", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.33:*:*:*:*:*:*:*", "matchCriteriaId": "2A9A4328-F274-4591-A386-943FD6608374", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.34:*:*:*:*:*:*:*", "matchCriteriaId": "1B4A8C9A-A475-4F02-A6BC-F17CEECBF0AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.35:*:*:*:*:*:*:*", "matchCriteriaId": "CF11B38A-12D7-453A-870D-CDC2DE9313CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.36:*:*:*:*:*:*:*", "matchCriteriaId": "9D69ACB7-CF9A-40B5-819E-58DA884D4E1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E56DB29-571D-4615-B347-38CF4590E463", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "FC1188DA-6C27-48D2-9CE7-74D77B24EE9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "A93B8F91-5C56-44DE-AE29-8468E853759F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "BF7F4D02-7C8E-403C-A53E-A5F8C07F33A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "D85031A3-3444-4650-905D-721F1EBAA24F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "6F0AC2B3-6E8A-4B26-8A6C-792D9E5072C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "2BC8D6D4-A389-4A78-8DA8-351A9CB896E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "5E979AC4-58EA-4297-9F90-350924BBE440", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "3A58CCD3-4A0C-468B-85F2-59A52B7293A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "3542DB91-8487-49D6-AA15-E8FD9D6B99D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "6BA4F3F1-C3F1-4E15-A854-9BB84E33E4AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "661D710E-79F0-4E98-B35B-ED0549D35C24", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "68291ADE-F9D1-427B-B150-FDA7F2F4788B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F80CBCB-F58D-4BE7-8E78-67E04C900D01", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "EB61D32E-3400-480E-BD27-BA3F98F94427", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "D9154EDB-CAE6-4BB0-8D02-9EC2B81D93C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "A432B0A7-F158-4B9C-97F6-6A29DB13EAFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "687C67CB-46AF-40C2-8A02-081C7F78568A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "6E8D6EC0-A61E-4DBC-A0C7-864E9C4BDA1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EF7F65A-45FD-4586-901E-49B057100BB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "300F158E-ED27-46C8-85E4-AA0AA6B201DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "FB6F04C0-3226-4D2C-97A3-39999483C62C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "30685A20-963A-48D4-B7D7-2C11C2C812AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "C54C3AAC-4D5D-4661-86AB-6849982E8C67", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "6F847916-89F1-4AA6-973D-6002C8B54EE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "5359815E-671A-4DFD-9E99-8CF903A03C84", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "E2EFBC9E-4DCA-43CB-93EB-6807E2383A98", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.18:*:*:*:*:*:*:*", "matchCriteriaId": "98755B1B-CAD5-4AC5-8571-52E67C3A8274", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:*:*:*:*:*:*:*", "matchCriteriaId": "C9D8C8FE-3D09-4F60-AD03-9D4439942141", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc1:*:*:*:*:*:*", "matchCriteriaId": "902FBE4B-5237-43CD-8EB6-D2CAC0F30879", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc2:*:*:*:*:*:*", "matchCriteriaId": "708DCACA-49EC-468D-81EC-CE5367F8A164", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc3:*:*:*:*:*:*", "matchCriteriaId": "BA9E3314-7D23-414C-8187-16D807410B62", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc4:*:*:*:*:*:*", "matchCriteriaId": "D824ED7B-BAB6-4C0F-A6B0-A75AB072EC0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A01CE63-F834-48B2-826D-2DAD1B4AE8C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "88B9CC9D-3DC2-4674-BA52-4C6D4E2056C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:*:*:*:*:*:*:*", "matchCriteriaId": "43F1849F-1230-45E7-B6A3-D6FC72EB0F11", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc1:*:*:*:*:*:*", "matchCriteriaId": "873C9C7E-93A3-4269-B19C-AB33A21C1AC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc2:*:*:*:*:*:*", "matchCriteriaId": "457F2112-7C5E-4953-8F4C-117925D486DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc3:*:*:*:*:*:*", "matchCriteriaId": "BD15ADD6-D7FA-441A-A9BC-487BCC15F2A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "792A8901-B7B8-40E8-9258-6338B72770FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:*:*:*:*:*:*:*", "matchCriteriaId": "0E6C8F78-0C00-45A5-8FEB-2A4BD5AC1A37", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:rc1:*:*:*:*:*:*", "matchCriteriaId": "F3E04247-C4EF-4C1B-B879-5C02986950D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:rc2:*:*:*:*:*:*", "matchCriteriaId": "5E382FC8-4001-4058-9151-05AE98B4A35E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "11FECE6B-B6A6-4DDA-9019-9A10B05EC1F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "D9813D27-0688-4989-99EB-1DC0F82D59F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:*:*:*:*:*:*:*", "matchCriteriaId": "D4333904-9D21-4149-965F-F49F0A34BD85", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc1:*:*:*:*:*:*", "matchCriteriaId": "F7180626-F0FD-46F3-AD52-5C67525C4B46", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc2:*:*:*:*:*:*", "matchCriteriaId": "85A1E3A3-C157-4F3D-9477-F63771E7F627", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc3:*:*:*:*:*:*", "matchCriteriaId": "FEE739CC-7A9C-489E-BFC0-6257129C043D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc4:*:*:*:*:*:*", "matchCriteriaId": "ADC0E947-A95A-44ED-8DED-CC769FF00569", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc5:*:*:*:*:*:*", "matchCriteriaId": "DE52BD9F-3728-455C-BC45-1A4DB926FFE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22.1:*:*:*:*:*:*:*", "matchCriteriaId": "1EF82D41-9222-42D3-ADAD-94B4F950C63F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AE9F181-A8E4-4700-A30F-211CDE251606", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:*:*:*:*:*:*:*", "matchCriteriaId": "5B10AE4B-EC2D-4D5B-B842-50F5097A0650", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc1:*:*:*:*:*:*", "matchCriteriaId": "83E854D0-17A2-473B-B7E8-41E6447C81DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc2:*:*:*:*:*:*", "matchCriteriaId": "47169133-3854-4D8F-B79E-3CC77A166EF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc3:*:*:*:*:*:*", "matchCriteriaId": "6071601F-CF37-4E66-9D6D-AFC3434C18AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc4:*:*:*:*:*:*", "matchCriteriaId": "2A575824-E005-4820-824A-4875594619E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "080C7089-5662-4A94-9842-C4A26095DA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23.2:*:*:*:*:*:*:*", "matchCriteriaId": "7AE38697-0B16-4032-9234-CA263E4A9885", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.24:*:*:*:*:*:*:*", "matchCriteriaId": "DCB18BE2-B073-429C-ABE7-B8305793DAE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.24:rc1:*:*:*:*:*:*", "matchCriteriaId": "FA7216BA-A42F-4ED8-8086-B4FA483FDAB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "CB7D2048-CD61-46C0-830B-11976B275783", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.25:*:*:*:*:*:*:*", "matchCriteriaId": "8DBA63FE-62AF-4F3D-B30C-550D17C4E35F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.25:rc1:*:*:*:*:*:*", "matchCriteriaId": "AD0A0F19-020D-4578-9023-12B0CB646D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.25.1:*:*:*:*:*:*:*", "matchCriteriaId": "96D5A1E3-FF0B-4C71-AA51-655D7106880D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:*:*:*:*:*:*:*", "matchCriteriaId": "E5D425E6-E2E5-4452-9EAA-2697C1155784", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc1:*:*:*:*:*:*", "matchCriteriaId": "9855FA26-0930-4AC9-A920-B394F6916349", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc2:*:*:*:*:*:*", "matchCriteriaId": "BBA21246-7DF4-41BC-998A-05D38FC97C8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc3:*:*:*:*:*:*", "matchCriteriaId": "EE9A7984-22C9-4296-8E44-C010E67F193D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc4:*:*:*:*:*:*", "matchCriteriaId": "51B2C42A-C252-4BD8-A908-8F30C2BF15E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc5:*:*:*:*:*:*", "matchCriteriaId": "2137CEAD-0F19-43C5-A26D-1972564FCD8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc6:*:*:*:*:*:*", "matchCriteriaId": "B7552466-B782-4F16-8561-A2A51E94FED4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26.1:*:*:*:*:*:*:*", "matchCriteriaId": "C2F8C82D-3031-4C62-89FA-3BF56EA29727", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26.2:*:*:*:*:*:*:*", "matchCriteriaId": "B3074CEA-46BD-4CAD-BF5C-10008A80E434", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E06848DE-6EE1-4FD0-A14F-39D41B2F3E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc5:*:*:*:*:*:*", "matchCriteriaId": "88FBC328-538A-4484-A342-1688D9669B9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B8374B5D-DE7A-4C3C-A5FE-579B17006A54", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "C7494CE2-D3CC-404D-BE61-09A2E1FB3E47", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "06E48482-D9AF-4038-80DA-27D9B4907C0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "9BC3C441-290F-471A-BA19-6B1C4D72A670", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "632ED295-B67D-43CF-BF38-CCE04088BA08", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "50F3835F-6F2B-4EA7-B111-3B3C26548BC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "0DCF7BD2-7903-4DC5-ADDC-EFCDC58736C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "E5BECFE0-286F-4DA1-8CA9-6CEE861C3012", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta7.1:*:*:*:*:*:*", "matchCriteriaId": "AFFF3245-2D0F-46E3-A1D6-319086489DC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta8:*:*:*:*:*:*", "matchCriteriaId": "C91F2524-99D1-4C4B-9A31-21C0FB8B4D5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta9:*:*:*:*:*:*", "matchCriteriaId": "7B1BC0FF-9DB6-4FCC-A845-053943CF0D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "419D4D16-E790-4872-B9AF-1320978768C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "73D30BA6-1EE0-4C3F-8F69-65C698A1B9A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:rc6:*:*:*:*:*:*", "matchCriteriaId": "D39FA25D-AB56-470D-94AB-14446DB7D475", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4225252F-5960-4A42-A575-00C125860E89", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A65D76A8-BBDD-4BDE-B789-D745C400DCBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "A8B0F5A5-4252-4A9C-B830-2419E87AE5A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "F9085056-3BE9-4309-9601-9CA0569BC215", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.4:rc1:*:*:*:*:*:*", "matchCriteriaId": "D8432455-9064-479F-B060-BF2A74ECC3EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "9E8EF2D7-371B-4268-989E-25225CC1F7B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "ABAC4CE9-1CFA-4279-B0CE-18F3C6FB9AB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E16E37A0-F739-4EEE-A1BB-EBC558C62767", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "DF0E2562-D0FC-404C-B725-617AEEF20AB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "C831EC2A-C99D-4FB1-8E5C-2FF685792F2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "F37C4158-6C4E-448D-929B-288480748289", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "6BBA9D27-E3DC-45CE-B56B-2C6781AA6A16", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.11:rc1:*:*:*:*:*:*", "matchCriteriaId": "14CD1CCD-DFF2-4813-B56F-EA1C78AA818E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.11:rc2:*:*:*:*:*:*", "matchCriteriaId": "4499411B-C92E-47F3-A6F2-8C9011B1CBCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "57325096-F4D8-4146-A6FD-93219F2C72D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.14:rc1:*:*:*:*:*:*", "matchCriteriaId": "9684FD88-7422-4272-B9BC-D8638B1AA0B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "648639A2-26C4-4EDA-A982-25D400836696", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "4F9F6FF8-8B88-4A02-B23A-0CADA8CE316E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.16:rc1:*:*:*:*:*:*", "matchCriteriaId": "37DE011D-1C1B-46AC-9265-F82693CE3C9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.16:rc2:*:*:*:*:*:*", "matchCriteriaId": "790BF14A-0193-4A5C-802B-D82200B22342", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "15C4C10F-BD36-491A-87E7-2F072796DA33", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B8FE4BCF-9AE7-4F41-BA84-E9537CC1EBE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F25B0D15-7C09-4BBB-AC84-A1898F448DB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F259057F-3720-45D8-91B4-70A11B759794", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "A106C460-4CE2-4AC3-B2FD-310F05507511", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "3E119FF9-2AD3-450D-8BBF-C6DD063246EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "759221D5-FC37-446D-9628-233B8D0B9120", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F82D4812-0429-42D4-BD27-C76CB9E7C368", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8FE11D6-8C0A-450E-B6DA-3AFE04D82232", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "5D1FBCC8-4637-4A67-BFFD-C052C3C03C12", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "F7307E10-9FA5-4940-B837-7936384F61DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "3D0DC9D6-D4D6-46CB-98DA-F4FC1835B6B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBBD0747-F3FF-46D8-A3C4-8268E37BC5AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.7:rc1:*:*:*:*:*:*", "matchCriteriaId": "3F759F27-008E-47FB-AC0A-EF11DA19918E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.7:rc2:*:*:*:*:*:*", "matchCriteriaId": "D15C82BA-BD1F-4A19-A907-E6C30042F537", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "2E802481-C8BD-4218-8CDC-5DB112DA946C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "93C020CD-D0EA-4B3E-B33C-F900B08B28FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:rc1:*:*:*:*:*:*", "matchCriteriaId": "0004AADE-1652-4242-A97D-E9818FE03CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:rc2:*:*:*:*:*:*", "matchCriteriaId": "543E9C91-60FE-43AE-9B94-08DD730BA814", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:rc3:*:*:*:*:*:*", "matchCriteriaId": "252849FA-F46E-4F5A-A488-AA53574CA884", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:digium:s800i:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "565444DE-F67C-4B6E-AC1E-92FC0D8A87CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:digium:s800i:1.3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "80E356B2-4AEA-4532-A6F8-13B814BEB2C8", "vulnerable": true }, { "criteria": "cpe:2.3:h:digium:s800i:1.3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "60F261AB-3172-4245-8090-744294A0D08A", "vulnerable": true }, { "criteria": "cpe:2.3:h:digium:s800i:1.3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "A3DD6B08-D77D-4275-8F91-2CA47FF6E363", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:b:-:business:*:*:*:*:*", "matchCriteriaId": "564A4529-997D-4615-BED8-AE3FB159689A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.1.3.2:-:business:*:*:*:*:*", "matchCriteriaId": "FE9D66C4-F49D-4EC4-B5A9-24F28726A9B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.1.3.3:-:business:*:*:*:*:*", "matchCriteriaId": "BEFA5054-D5F9-4D07-9A66-D7AAD6953F5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.2.0:-:business:*:*:*:*:*", "matchCriteriaId": "D110DCEB-F2F9-4600-B49F-22952C71B785", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.2.1:-:business:*:*:*:*:*", "matchCriteriaId": "3333A119-D92F-433C-BF5D-0037199256C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.3.1:-:business:*:*:*:*:*", "matchCriteriaId": "19C44C33-EADA-48FD-A634-8066A003AFD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.3.2:-:business:*:*:*:*:*", "matchCriteriaId": "294A2BA2-26EB-40AD-B861-7FA9043CD097", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.3.3:-:business:*:*:*:*:*", "matchCriteriaId": "4FAC61AF-BDF2-4397-A8F8-9D9155836E4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.3.4:-:business:*:*:*:*:*", "matchCriteriaId": "33DE61C2-8C6A-4CD3-8D56-E70C4356CD50", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.3.5:-:business:*:*:*:*:*", "matchCriteriaId": "EECB5F75-BCE2-4777-933E-25EB5657750C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.3.6:-:business:*:*:*:*:*", "matchCriteriaId": "B5D51557-3E67-4C9A-9753-472D13FCA5C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.5.0:-:business:*:*:*:*:*", "matchCriteriaId": "C063FCFA-B1C3-4ACB-B9E7-B3FC973FD898", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.5.1:-:business:*:*:*:*:*", "matchCriteriaId": "761DB3A3-1540-4976-AEB2-F8E45CCCC5E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.5.2:-:business:*:*:*:*:*", "matchCriteriaId": "B53CD2C1-9BF0-42F9-B3E3-2C9915E531C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:b.2.5.3:-:business:*:*:*:*:*", "matchCriteriaId": "947F58B8-21AF-460B-8203-D2605A1F91D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c:-:business:*:*:*:*:*", "matchCriteriaId": "7CD989BE-8FA0-4EDB-8442-C2E12BD01D27", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.2.3:-:business:*:*:*:*:*", "matchCriteriaId": "3FA908BA-BEF8-44A5-AC95-E7CF020D0C94", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.3.0:-:business:*:*:*:*:*", "matchCriteriaId": "78E8936C-033B-49E6-BB39-D5BBBC80EB55", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "rtp.c in Asterisk Open Source 1.2.x before 1.2.37, 1.4.x before 1.4.27.1, 1.6.0.x before 1.6.0.19, and 1.6.1.x before 1.6.1.11; Business Edition B.x.x before B.2.5.13, C.2.x.x before C.2.4.6, and C.3.x.x before C.3.2.3; and s800i 1.3.x before 1.3.0.6 allows remote attackers to cause a denial of service (daemon crash) via an RTP comfort noise payload with a long data length." }, { "lang": "es", "value": "rtp.c en Asterisk Open Source v1.2.x anterior a v1.2.37, v1.4.x anterior a v1.4.27.1, v1.6.0.x anterior a v1.6.0.19, y v1.6.1.x anterior a v1.6.1.11; Business Edition B.x.x anterior a B.2.5.13, C.2.x.x anterior a C.2.4.6, y C.3.x.x anterior a C.3.2.3; y s800i v1.3.x anterior a v1.3.0.6 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio) a trav\u00e9s una carga \u00fatil del RTP ruido de confort con una larga longitud de datos." } ], "id": "CVE-2009-4055", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-12-02T11:30:00.517", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.2.diff.txt" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.4.diff.txt" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.6.0.diff.txt" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.6.1.diff.txt" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.digium.com/pub/security/AST-2009-010.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://secunia.com/advisories/37530" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37677" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/37708" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1023249" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2009/dsa-1952" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/60569" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/archives/fedora-package-announce/2009-December/msg00759.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/508147/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/37153" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3368" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54471" }, { "source": "cve@mitre.org", "url": "https://issues.asterisk.org/view.php?id=16242" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.2.diff.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.4.diff.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.6.0.diff.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.6.1.diff.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.digium.com/pub/security/AST-2009-010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://secunia.com/advisories/37530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37677" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37708" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1023249" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2009/dsa-1952" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/60569" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/archives/fedora-package-announce/2009-December/msg00759.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/508147/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/37153" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3368" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54471" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.asterisk.org/view.php?id=16242" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-11-30 01:46
Modified
2025-04-09 00:30
Severity ?
Summary
SQL injection vulnerability in the Postgres Realtime Engine (res_config_pgsql) in Asterisk 1.4.x before 1.4.15 and C.x before C.1.0-beta6 allows remote attackers to execute arbitrary SQL commands via unknown vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "509EE4B3-B44A-446F-B1B5-476A8BE0F4D6", "versionEndExcluding": "1.4.15", "versionStartIncluding": "1.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.0:beta1:*:*:business:*:*:*", "matchCriteriaId": "5B85E573-3A3A-471F-906D-8A262315D0CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.0:beta2:*:*:business:*:*:*", "matchCriteriaId": "65963B39-845B-47D9-A1BD-6ABBA160EF05", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.0:beta3:*:*:business:*:*:*", "matchCriteriaId": "4015BA36-F972-434D-8DA0-4ECE9992275A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.0:beta4:*:*:business:*:*:*", "matchCriteriaId": "587B6E6C-11C5-4721-B0F3-77E77B1C65A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:c.1.0:beta5:*:*:business:*:*:*", "matchCriteriaId": "E4160773-6EA9-4339-9DD1-28D4EE591830", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in the Postgres Realtime Engine (res_config_pgsql) in Asterisk 1.4.x before 1.4.15 and C.x before C.1.0-beta6 allows remote attackers to execute arbitrary SQL commands via unknown vectors." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en Postgres Realtime Engine (res_config_pgsql) de Asterisk 1.4.x anterior a 1.4.15 y C.x before C.1.0-beta6 permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n mediante vectores desconocidos." } ], "id": "CVE-2007-6171", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-11-30T01:46:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.digium.com/pub/security/AST-2007-025.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://osvdb.org/38933" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/27873" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1019021" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/484387/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/26645" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/4055" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38766" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.digium.com/pub/security/AST-2007-025.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://osvdb.org/38933" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/27873" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1019021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/484387/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/26645" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/4055" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38766" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-12-15 03:57
Modified
2025-04-11 00:51
Severity ?
Summary
The SIP over UDP implementation in Asterisk Open Source 1.4.x before 1.4.43, 1.6.x before 1.6.2.21, and 1.8.x before 1.8.7.2 uses different port numbers for responses to invalid requests depending on whether a SIP username exists, which allows remote attackers to enumerate usernames via a series of requests.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6344E43-E8AA-4340-B3A7-72F5D6A5D184", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "4C170C1C-909D-4439-91B5-DB1A9CD150C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EE821BE5-B1D3-4854-A700-3A83E5F15724", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "149C57CA-0B4B-4220-87FC-432418D1C393", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "035595D5-BBEC-4D85-AD7A-A2C932D2BA70", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "6DAF5655-F09F-47F8-AFA6-4B95F77A57F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F8E001D8-0A7B-4FDD-88E3-E124ED32B81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9D5CFFBD-785F-4417-A54A-F3565FD6E736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "D30EF999-92D1-4B19-8E32-1E4B35DE4EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "A67D156B-9C43-444F-ADEC-B21D99D1433C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "893EB152-6444-43DB-8714-9735354C873A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8447EE7-A834-41D7-9204-07BD3752870C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C04F2C9-5672-42F2-B664-A3EE4C954C29", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "33465668-4C91-4619-960A-D26D77853E53", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "CAD08674-0B44-44EA-940B-6812E2D5077D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "EEE87710-A129-43AA-BA08-8001848975FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F582C6E-5DA0-4D72-A40E-66BDBC5CF2B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CEBB8-01B3-4A05-AFE8-37A143C9833E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "522733A7-E89E-4BFD-AC93-D6882636E880", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "2FAC47DD-B613-43E4-B9BF-6120B81D9789", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "86D20CB5-60E8-405E-B387-CF80C7DA5E07", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "71AB5A01-5961-4053-9111-CF32C6473A00", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*", "matchCriteriaId": "77D8E1DC-041F-4B87-AF9A-E0EC4D6A4BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7CCCB892-30CE-4BEF-904E-5D957F94D0EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "F156798F-F2EF-4366-B17E-03165AB437D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "9EFBB9A6-DD1D-436E-919F-74A3E4F40396", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "054E34C8-B6A5-48C7-938E-D3C268E0E8BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*", "matchCriteriaId": "1DCECA72-533A-4A95-AB19-20C5F09A1B01", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*", "matchCriteriaId": "0E2309F8-AFEE-4150-99D1-BA606432ED73", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*", "matchCriteriaId": "7785F282-BFA0-400A-8398-872ACCA4BF37", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1278D3FB-78C6-4F7D-A845-0A93D4F6E2B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "C00A6EFB-A848-46D3-AAD7-FD8140007E42", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "CB6E3972-5C53-4B6D-BFE1-67E1122EA013", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "048617A0-A783-4519-A947-35220D4CD786", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "DD493A41-E686-444C-A34E-412804510F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "87D25FD6-CC3A-4AB0-B7B1-67D07386F99D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C402E9E-09CC-4EFA-AC27-156437B05B22", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C8A41F9C-D2F4-47A9-80CD-2B1BF6B0CB63", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "627FF5B9-E5A8-4DBC-A891-B175011E72A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6146EB2E-BA32-4408-B10B-A711EC39C580", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "1C863324-05AE-4FCA-BD2E-39040A468DCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A85F51E7-0AAE-4F3B-9F90-BD2E31255822", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "315FB0D4-D4A4-4369-BFB8-F2CAEB429015", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "DC74D6C5-F410-4B68-AF92-056B727193A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "B70911F8-A526-4600-8198-03FF4CCB28DE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1F8B700A-FACB-4BC8-9DF2-972DC63D852B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FFD31B9B-2F43-4637-BE56-47A807384BF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "E6450D6B-C907-49E6-9788-E4029C09285F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "DDB0432E-024A-4C0C-87FF-448E513D2834", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "D6A6A343-FEA2-49E5-9858-455AE3B29470", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc6:*:*:*:*:*:*", "matchCriteriaId": "D57B94E3-EA37-466C-ADC4-5180D4502FDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc7:*:*:*:*:*:*", "matchCriteriaId": "64D35A89-6B21-4770-AA0F-424C5C91A254", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc8:*:*:*:*:*:*", "matchCriteriaId": "14817302-A34A-4980-B148-AEB4B3B49BE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "61FDFA96-E62A-413B-9846-F51F1F7349EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "DA924386-49F6-4371-B975-B1473EEA12F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "B74A1B99-8901-4690-B994-1DAD3EFA5ABB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "4253C7DD-3588-4B35-B96D-C027133BE93F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "24AE11DB-16D3-42BF-BC64-E8982107D35B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "53841D77-926C-4362-BC85-BD8B6AC4391D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "F98FD6E6-EDE9-437D-B7C2-2DB65B73D230", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "4BA6CA77-D358-4623-8400-78EFC47ADB7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "B4E62DAB-45E0-4EAA-8E45-6D3757A679D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.15:rc1:*:*:*:*:*:*", "matchCriteriaId": "1355578C-B384-401A-9123-2789CBECAD0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "3491F8DB-A162-4608-B5F9-5401FE058CEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16:rc1:*:*:*:*:*:*", "matchCriteriaId": "C52730A8-D96E-46C1-8905-1D78A93E9C84", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "C6E5CD17-B14A-4BDB-BA75-261344FF6F25", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "63C8DBF5-6992-4618-BD2D-56F1F98EAE3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "EEED6C07-CFB7-44DC-9A41-9B6271942123", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:rc1:*:*:*:*:*:*", "matchCriteriaId": "0864DAF9-B7FA-4018-99F4-F2A7AA6FBBB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:rc2:*:*:*:*:*:*", "matchCriteriaId": "694B257B-E73B-4534-B316-87284FA45534", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:rc3:*:*:*:*:*:*", "matchCriteriaId": "418FD91F-014E-4529-8D72-D3FB27788EEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "D213EC93-0D4F-4BD9-9F13-9A9E705135EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17.2:*:*:*:*:*:*:*", "matchCriteriaId": "2E9D2091-B292-4D6E-A91F-58D24BD5A5E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17.3:*:*:*:*:*:*:*", "matchCriteriaId": "CFF196A0-87E1-4DD2-8CDA-B19EB6F71312", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "6F59B7C5-8EF3-495E-9A91-9C96E6DF41E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.18:rc1:*:*:*:*:*:*", "matchCriteriaId": "D9020FF4-645B-4E98-8CB0-3F8DF7C5841B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "4F0B515F-6C5B-4A32-BE6E-3B154B4340CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.19:rc1:*:*:*:*:*:*", "matchCriteriaId": "679A2262-1C6B-4549-84A9-878D7FA502F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "86B7F9F0-A597-42BC-AD54-FAD928B7A332", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.21:*:*:*:*:*:*:*", "matchCriteriaId": "76A47DCB-689A-4BD5-B3A5-7DA20052A3B6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E56DB29-571D-4615-B347-38CF4590E463", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "FC1188DA-6C27-48D2-9CE7-74D77B24EE9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "A93B8F91-5C56-44DE-AE29-8468E853759F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "BF7F4D02-7C8E-403C-A53E-A5F8C07F33A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "D85031A3-3444-4650-905D-721F1EBAA24F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "6F0AC2B3-6E8A-4B26-8A6C-792D9E5072C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "2BC8D6D4-A389-4A78-8DA8-351A9CB896E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "5E979AC4-58EA-4297-9F90-350924BBE440", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "3A58CCD3-4A0C-468B-85F2-59A52B7293A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "3542DB91-8487-49D6-AA15-E8FD9D6B99D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "6BA4F3F1-C3F1-4E15-A854-9BB84E33E4AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "661D710E-79F0-4E98-B35B-ED0549D35C24", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "68291ADE-F9D1-427B-B150-FDA7F2F4788B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F80CBCB-F58D-4BE7-8E78-67E04C900D01", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "EB61D32E-3400-480E-BD27-BA3F98F94427", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "D9154EDB-CAE6-4BB0-8D02-9EC2B81D93C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "A432B0A7-F158-4B9C-97F6-6A29DB13EAFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "687C67CB-46AF-40C2-8A02-081C7F78568A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "6E8D6EC0-A61E-4DBC-A0C7-864E9C4BDA1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EF7F65A-45FD-4586-901E-49B057100BB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "300F158E-ED27-46C8-85E4-AA0AA6B201DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "FB6F04C0-3226-4D2C-97A3-39999483C62C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "30685A20-963A-48D4-B7D7-2C11C2C812AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "C54C3AAC-4D5D-4661-86AB-6849982E8C67", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "6F847916-89F1-4AA6-973D-6002C8B54EE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "5359815E-671A-4DFD-9E99-8CF903A03C84", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "E2EFBC9E-4DCA-43CB-93EB-6807E2383A98", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.18:*:*:*:*:*:*:*", "matchCriteriaId": "98755B1B-CAD5-4AC5-8571-52E67C3A8274", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:*:*:*:*:*:*:*", "matchCriteriaId": "C9D8C8FE-3D09-4F60-AD03-9D4439942141", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc1:*:*:*:*:*:*", "matchCriteriaId": "902FBE4B-5237-43CD-8EB6-D2CAC0F30879", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc2:*:*:*:*:*:*", "matchCriteriaId": "708DCACA-49EC-468D-81EC-CE5367F8A164", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc3:*:*:*:*:*:*", "matchCriteriaId": "BA9E3314-7D23-414C-8187-16D807410B62", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc4:*:*:*:*:*:*", "matchCriteriaId": "D824ED7B-BAB6-4C0F-A6B0-A75AB072EC0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A01CE63-F834-48B2-826D-2DAD1B4AE8C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "88B9CC9D-3DC2-4674-BA52-4C6D4E2056C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:*:*:*:*:*:*:*", "matchCriteriaId": "43F1849F-1230-45E7-B6A3-D6FC72EB0F11", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc1:*:*:*:*:*:*", "matchCriteriaId": "873C9C7E-93A3-4269-B19C-AB33A21C1AC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc2:*:*:*:*:*:*", "matchCriteriaId": "457F2112-7C5E-4953-8F4C-117925D486DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc3:*:*:*:*:*:*", "matchCriteriaId": "BD15ADD6-D7FA-441A-A9BC-487BCC15F2A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "792A8901-B7B8-40E8-9258-6338B72770FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:*:*:*:*:*:*:*", "matchCriteriaId": "0E6C8F78-0C00-45A5-8FEB-2A4BD5AC1A37", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:rc1:*:*:*:*:*:*", "matchCriteriaId": "F3E04247-C4EF-4C1B-B879-5C02986950D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:rc2:*:*:*:*:*:*", "matchCriteriaId": "5E382FC8-4001-4058-9151-05AE98B4A35E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "11FECE6B-B6A6-4DDA-9019-9A10B05EC1F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "D9813D27-0688-4989-99EB-1DC0F82D59F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:*:*:*:*:*:*:*", "matchCriteriaId": "D4333904-9D21-4149-965F-F49F0A34BD85", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc1:*:*:*:*:*:*", "matchCriteriaId": "F7180626-F0FD-46F3-AD52-5C67525C4B46", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc2:*:*:*:*:*:*", "matchCriteriaId": "85A1E3A3-C157-4F3D-9477-F63771E7F627", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc3:*:*:*:*:*:*", "matchCriteriaId": "FEE739CC-7A9C-489E-BFC0-6257129C043D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc4:*:*:*:*:*:*", "matchCriteriaId": "ADC0E947-A95A-44ED-8DED-CC769FF00569", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc5:*:*:*:*:*:*", "matchCriteriaId": "DE52BD9F-3728-455C-BC45-1A4DB926FFE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22.1:*:*:*:*:*:*:*", "matchCriteriaId": "1EF82D41-9222-42D3-ADAD-94B4F950C63F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AE9F181-A8E4-4700-A30F-211CDE251606", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:*:*:*:*:*:*:*", "matchCriteriaId": "5B10AE4B-EC2D-4D5B-B842-50F5097A0650", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc1:*:*:*:*:*:*", "matchCriteriaId": "83E854D0-17A2-473B-B7E8-41E6447C81DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc2:*:*:*:*:*:*", "matchCriteriaId": "47169133-3854-4D8F-B79E-3CC77A166EF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc3:*:*:*:*:*:*", "matchCriteriaId": "6071601F-CF37-4E66-9D6D-AFC3434C18AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc4:*:*:*:*:*:*", "matchCriteriaId": "2A575824-E005-4820-824A-4875594619E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "080C7089-5662-4A94-9842-C4A26095DA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23.2:*:*:*:*:*:*:*", "matchCriteriaId": "7AE38697-0B16-4032-9234-CA263E4A9885", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.24:*:*:*:*:*:*:*", "matchCriteriaId": "DCB18BE2-B073-429C-ABE7-B8305793DAE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.24:rc1:*:*:*:*:*:*", "matchCriteriaId": "FA7216BA-A42F-4ED8-8086-B4FA483FDAB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "CB7D2048-CD61-46C0-830B-11976B275783", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.25:*:*:*:*:*:*:*", "matchCriteriaId": "8DBA63FE-62AF-4F3D-B30C-550D17C4E35F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.25:rc1:*:*:*:*:*:*", "matchCriteriaId": "AD0A0F19-020D-4578-9023-12B0CB646D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.25.1:*:*:*:*:*:*:*", "matchCriteriaId": "96D5A1E3-FF0B-4C71-AA51-655D7106880D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:*:*:*:*:*:*:*", "matchCriteriaId": "E5D425E6-E2E5-4452-9EAA-2697C1155784", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc1:*:*:*:*:*:*", "matchCriteriaId": "9855FA26-0930-4AC9-A920-B394F6916349", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc2:*:*:*:*:*:*", "matchCriteriaId": "BBA21246-7DF4-41BC-998A-05D38FC97C8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc3:*:*:*:*:*:*", "matchCriteriaId": "EE9A7984-22C9-4296-8E44-C010E67F193D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc4:*:*:*:*:*:*", "matchCriteriaId": "51B2C42A-C252-4BD8-A908-8F30C2BF15E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc5:*:*:*:*:*:*", "matchCriteriaId": "2137CEAD-0F19-43C5-A26D-1972564FCD8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc6:*:*:*:*:*:*", "matchCriteriaId": "B7552466-B782-4F16-8561-A2A51E94FED4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26.1:*:*:*:*:*:*:*", "matchCriteriaId": "C2F8C82D-3031-4C62-89FA-3BF56EA29727", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26.2:*:*:*:*:*:*:*", "matchCriteriaId": "B3074CEA-46BD-4CAD-BF5C-10008A80E434", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6AB8988-FCC6-407A-A7D9-2F7A3A7488B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E06848DE-6EE1-4FD0-A14F-39D41B2F3E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc1:*:*:*:*:*:*", "matchCriteriaId": "CF342950-FDD7-41A9-94D5-EDF41130B61E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc2:*:*:*:*:*:*", "matchCriteriaId": "6E4543AA-3D54-4444-AD1F-381A87A89DA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc3:*:*:*:*:*:*", "matchCriteriaId": "AF3036DD-261C-4975-A01E-92CD29479588", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc4:*:*:*:*:*:*", "matchCriteriaId": "EF07C116-27DC-4875-9DCF-049E2A8EAEA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc5:*:*:*:*:*:*", "matchCriteriaId": "88FBC328-538A-4484-A342-1688D9669B9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27.1:*:*:*:*:*:*:*", "matchCriteriaId": "CBF2301E-F6EF-4D28-82EE-FA1AB8CA9E43", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.28:*:*:*:*:*:*:*", "matchCriteriaId": "A53F637C-846A-43FC-BA71-C8571648FA46", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.28:rc1:*:*:*:*:*:*", "matchCriteriaId": "E61070F4-1B6B-4814-918E-459DE5119A24", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.29:*:*:*:*:*:*:*", "matchCriteriaId": "70664E0F-09CF-42C2-A7A7-E635D022E90D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.29:rc1:*:*:*:*:*:*", "matchCriteriaId": "D1E13E1A-C2D4-4E5A-84C8-E6AF061D67C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.29.1:*:*:*:*:*:*:*", "matchCriteriaId": "7E811134-B657-4C50-9AEF-A7F68CA5577A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.30:*:*:*:*:*:*:*", "matchCriteriaId": "4C4CD101-F079-4940-AA79-886B69A7A514", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.30:rc2:*:*:*:*:*:*", "matchCriteriaId": "B7B828E9-5BE3-4E6F-8048-F2B1F2E929CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.30:rc3:*:*:*:*:*:*", "matchCriteriaId": "75BB2066-74A6-4F89-B54C-35F234DC1F03", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.31:*:*:*:*:*:*:*", "matchCriteriaId": "FE522334-BF53-4E34-949B-CD928B59A341", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.31:rc1:*:*:*:*:*:*", "matchCriteriaId": "648DEC0E-3CBC-4EA2-AF27-2C518B0762CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.31:rc2:*:*:*:*:*:*", "matchCriteriaId": "B50F4BAE-D00D-4352-B52B-BE1A9FFB6949", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.32:*:*:*:*:*:*:*", "matchCriteriaId": "E7A35508-8235-4915-8810-12B2630C82C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.32:rc1:*:*:*:*:*:*", "matchCriteriaId": "63DD4EE5-6F56-41C7-9CB4-16ADF4F63B8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.33:*:*:*:*:*:*:*", "matchCriteriaId": "2347E451-2F89-4EA6-A6E0-22BCB0C8A56E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.33:rc1:*:*:*:*:*:*", "matchCriteriaId": "A86F5360-6FE4-4EA2-9208-076E78C842A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.33:rc2:*:*:*:*:*:*", "matchCriteriaId": "3CDFA85B-17A4-4ECC-9922-F5546917B4C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.33.1:*:*:*:*:*:*:*", "matchCriteriaId": "3D7D7DB7-32A7-490E-AED2-C404D371E7C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.34:*:*:*:*:*:*:*", "matchCriteriaId": "A03632BC-CA0F-42BD-8839-A72DB146A4A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.34:rc1:*:*:*:*:*:*", "matchCriteriaId": "9DC4EF64-6A1D-47CB-AC07-48CABB612DCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.34:rc2:*:*:*:*:*:*", "matchCriteriaId": "68C00FEF-7850-48F4-8122-4211D080B508", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.35:*:*:*:*:*:*:*", "matchCriteriaId": "D3A48F07-42E1-47E9-94EA-44D20A0BAC3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.35:rc1:*:*:*:*:*:*", "matchCriteriaId": "87D16470-5892-4289-BB35-B69100BCA31E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.36:*:*:*:*:*:*:*", "matchCriteriaId": "15E71BD7-83D1-4E2B-AD40-BB6B53056C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.36:rc1:*:*:*:*:*:*", "matchCriteriaId": "87FDE2E2-5F08-43EF-BBD8-7DCCC0C98870", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.37:*:*:*:*:*:*:*", "matchCriteriaId": "347E9D8C-A372-41F2-AB48-FFCAB454C9C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.37:rc1:*:*:*:*:*:*", "matchCriteriaId": "74F67E57-1DD0-4850-8D7E-7A9748BD106C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.38:*:*:*:*:*:*:*", "matchCriteriaId": "B208C056-B567-4BEE-A9B7-AEB394341D5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.38:rc1:*:*:*:*:*:*", "matchCriteriaId": "A0C3A2D4-07A9-4D28-AC18-03523E9FF34A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.39:*:*:*:*:*:*:*", "matchCriteriaId": "E6516E0F-9F60-4D20-88D3-B9CD8DC93062", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.39:rc1:*:*:*:*:*:*", "matchCriteriaId": "22147B91-45A4-4834-AC8D-2DC17A706BEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.39.1:*:*:*:*:*:*:*", "matchCriteriaId": "677C10DE-46D8-4EF1-BF22-63F3AE37CBC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.39.2:*:*:*:*:*:*:*", "matchCriteriaId": "E299CE20-B02D-4519-AC46-BB64B1E3826A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.40:*:*:*:*:*:*:*", "matchCriteriaId": "22FD16C3-7518-4208-8C0A-043C13C14A72", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.40:rc1:*:*:*:*:*:*", "matchCriteriaId": "2461B6B9-2C93-4D84-A1EE-C07AD32A9540", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.40:rc2:*:*:*:*:*:*", "matchCriteriaId": "C8A4CE2D-FBAB-4C35-846A-5B95BBCAD6BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.40:rc3:*:*:*:*:*:*", "matchCriteriaId": "30FFB6F4-1BC7-4D4C-9C65-A66CF514E321", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.40.1:*:*:*:*:*:*:*", "matchCriteriaId": "F745AF0A-D6A6-4429-BBBE-347BF41999BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.40.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC44F61B-AB96-4643-899B-19B9E3B4F05C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.41:*:*:*:*:*:*:*", "matchCriteriaId": "F788A255-CF21-424F-9F30-8A744CC16740", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.41:rc1:*:*:*:*:*:*", "matchCriteriaId": "92B8AA8E-D49B-4AD7-8AFC-BD4F9E9C7A16", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.41.1:*:*:*:*:*:*:*", "matchCriteriaId": "0606F179-8817-4124-B92B-CD868B216320", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.41.2:*:*:*:*:*:*:*", "matchCriteriaId": "E93609A6-7FFD-4179-86E9-0D1292B035B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.42:*:*:*:*:*:*:*", "matchCriteriaId": "6E73DCA2-DEB0-4966-9822-26543E16A3D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.42:rc1:*:*:*:*:*:*", "matchCriteriaId": "310FFFE1-1400-498F-B576-FA76DCC382BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.42:rc2:*:*:*:*:*:*", "matchCriteriaId": "225DA4A0-CCAB-448E-8ED8-399D68C45CF0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SIP over UDP implementation in Asterisk Open Source 1.4.x before 1.4.43, 1.6.x before 1.6.2.21, and 1.8.x before 1.8.7.2 uses different port numbers for responses to invalid requests depending on whether a SIP username exists, which allows remote attackers to enumerate usernames via a series of requests." }, { "lang": "es", "value": "La implementaci\u00f3n de SIP sobre UDP de Asterisk Open Source 1.4.x anteriores a 1.4.43, 1.6.x anteriores a 1.6.2.21, y 1.8.x anteriores a 1.8.7.2 utiliza diferentes n\u00fameros de puertos para respuestas a peticiones inv\u00e1lidas dependiendo de si el nombre de usuario SIP existe, lo que permite a atacantes remotos enumerar nombres de usuario a trav\u00e9s de series de peticiones." } ], "id": "CVE-2011-4597", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-12-15T03:57:34.310", "references": [ { "source": "secalert@redhat.com", "url": "http://archives.neohapsis.com/archives/bugtraq/2011-12/0151.html" }, { "source": "secalert@redhat.com", "url": "http://downloads.asterisk.org/pub/security/AST-2011-013.html" }, { "source": "secalert@redhat.com", "url": "http://lists.digium.com/pipermail/asterisk-dev/2011-November/052191.html" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2011/12/09/3" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2011/12/09/4" }, { "source": "secalert@redhat.com", "url": "http://osvdb.org/77597" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/47273" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2011/dsa-2367" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2011-12/0151.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://downloads.asterisk.org/pub/security/AST-2011-013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.digium.com/pipermail/asterisk-dev/2011-November/052191.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2011/12/09/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2011/12/09/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/77597" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/47273" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2367" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-01-04 15:55
Modified
2025-04-11 00:51
Severity ?
Summary
Asterisk Open Source 1.8.x before 1.8.19.1, 10.x before 10.11.1, and 11.x before 11.1.2; Certified Asterisk 1.8.11 before 1.8.11-cert10; and Asterisk Digiumphones 10.x-digiumphones before 10.11.1-digiumphones, when anonymous calls are enabled, allow remote attackers to cause a denial of service (resource consumption) by making anonymous calls from multiple sources and consequently adding many entries to the device state cache.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEE324AC-5231-43DB-B077-EA1E0145FF5B", "versionEndIncluding": "1.8.19.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6344E43-E8AA-4340-B3A7-72F5D6A5D184", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "4C170C1C-909D-4439-91B5-DB1A9CD150C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EE821BE5-B1D3-4854-A700-3A83E5F15724", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "149C57CA-0B4B-4220-87FC-432418D1C393", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "035595D5-BBEC-4D85-AD7A-A2C932D2BA70", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "6DAF5655-F09F-47F8-AFA6-4B95F77A57F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F8E001D8-0A7B-4FDD-88E3-E124ED32B81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9D5CFFBD-785F-4417-A54A-F3565FD6E736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "D30EF999-92D1-4B19-8E32-1E4B35DE4EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "A67D156B-9C43-444F-ADEC-B21D99D1433C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "893EB152-6444-43DB-8714-9735354C873A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8447EE7-A834-41D7-9204-07BD3752870C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C04F2C9-5672-42F2-B664-A3EE4C954C29", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "33465668-4C91-4619-960A-D26D77853E53", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "CAD08674-0B44-44EA-940B-6812E2D5077D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "EEE87710-A129-43AA-BA08-8001848975FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F582C6E-5DA0-4D72-A40E-66BDBC5CF2B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CEBB8-01B3-4A05-AFE8-37A143C9833E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "522733A7-E89E-4BFD-AC93-D6882636E880", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "2FAC47DD-B613-43E4-B9BF-6120B81D9789", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "86D20CB5-60E8-405E-B387-CF80C7DA5E07", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "71AB5A01-5961-4053-9111-CF32C6473A00", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*", "matchCriteriaId": "77D8E1DC-041F-4B87-AF9A-E0EC4D6A4BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7CCCB892-30CE-4BEF-904E-5D957F94D0EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "F156798F-F2EF-4366-B17E-03165AB437D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "9EFBB9A6-DD1D-436E-919F-74A3E4F40396", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "054E34C8-B6A5-48C7-938E-D3C268E0E8BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*", "matchCriteriaId": "1DCECA72-533A-4A95-AB19-20C5F09A1B01", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*", "matchCriteriaId": "0E2309F8-AFEE-4150-99D1-BA606432ED73", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*", "matchCriteriaId": "7785F282-BFA0-400A-8398-872ACCA4BF37", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1278D3FB-78C6-4F7D-A845-0A93D4F6E2B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "C00A6EFB-A848-46D3-AAD7-FD8140007E42", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "CB6E3972-5C53-4B6D-BFE1-67E1122EA013", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "048617A0-A783-4519-A947-35220D4CD786", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "DD493A41-E686-444C-A34E-412804510F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "87D25FD6-CC3A-4AB0-B7B1-67D07386F99D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C402E9E-09CC-4EFA-AC27-156437B05B22", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C8A41F9C-D2F4-47A9-80CD-2B1BF6B0CB63", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "627FF5B9-E5A8-4DBC-A891-B175011E72A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6146EB2E-BA32-4408-B10B-A711EC39C580", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "1C863324-05AE-4FCA-BD2E-39040A468DCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A85F51E7-0AAE-4F3B-9F90-BD2E31255822", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "315FB0D4-D4A4-4369-BFB8-F2CAEB429015", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "DC74D6C5-F410-4B68-AF92-056B727193A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "B70911F8-A526-4600-8198-03FF4CCB28DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA60A9C9-C2EF-4971-BEFB-FF687DAEF2F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "BAFB22FA-CC24-4AFE-AC83-2D044563F7CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "00F3EB0D-7C63-46B5-BA95-8486B9716C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "00C1BF3B-7593-478D-9AAA-153901C70286", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "82423EC2-FA29-4AF6-86C3-6AC6DFDC4DC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "5F86406A-0936-4A06-88FB-4137A64498EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "672CE4C0-EBD6-470B-937E-810FF1C4CDBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "88DB1105-74D8-4312-9D02-D1E21F2E785C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "404C0557-6229-4D90-BFDD-54AFFCCE6A19", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6D1D26CC-891F-4396-B7D7-30D712829E71", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F25B61EA-F4D1-452A-9D96-B8DFDD719B0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9324AB96-EC99-4F04-A0A9-00F936C86EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "1B8B5E76-4A74-4E88-8A6F-C23538B7642A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "BDB6BBCA-47CE-49B8-9706-AFDE4BE46550", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "8BFF65E2-692B-4C39-88FC-6DED8D9A7258", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "5260E309-9320-4DB8-A918-7D215BF95D2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "60AFF340-A866-4CFE-9334-53B95FD4AA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "74E50309-CD7D-41F7-97DA-A7E451D0796A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "6FD3F8F8-820E-4C29-9F8F-023D1DB999CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "C33A6419-0D00-49D6-9A48-2B633610AAED", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "447E07C9-4A25-418D-B53F-609B78EE4C21", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E8AE686-B618-4B0D-BD27-1F96295E964D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E9751C0A-84F5-4A43-8282-12A9DE559569", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F67E2694-F6F1-482C-91F2-D9FD856EA31B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "5E2D53AA-8D50-445F-9500-2F580F260DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12:*:*:*:*:*:*:*", "matchCriteriaId": "8D9D7D88-D64F-4F54-8C84-6AC45FBD36F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "F67AB282-591C-4ED7-9750-C593A38D5D7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "C9F8F881-2BF7-44AB-8756-54A06801EB11", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "36EFF3C4-4D00-4BC5-94B9-403BB00C6AB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "5E434F10-395E-426E-A988-4CDA504577D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "8880AE7C-3E44-4B76-B500-E93868D4CF5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7C94269D-A271-42AC-A44C-102C814E564B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E7E5B826-D3D5-4D2D-BB4D-2C1BEDE92456", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "5BA564F7-7A69-4805-8C8C-C2EB5E12A6E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "DF6FA464-F9D3-4674-844B-A2B2E2C42A51", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "44722C8B-BB37-4444-A58A-F01D0B3B4DDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "C4FABFDB-D99A-4F83-8FEE-3BFA36BA4061", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "A842E112-8974-4E74-AD56-1DEF5B5DD9F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.15.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D9ACBC01-8A9D-43A5-A825-1CC9670417A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "61E7199F-EACE-431A-8ADD-B96A6FCDBC49", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA7CD0E5-8E69-43B5-A5FF-8B122475CC00", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.16.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "F4BEA1B2-2103-4E25-92A9-DB107D6D4AD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.16.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "2AD9AFFB-F903-43DD-9C1D-4D8E83EA25C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "6F368897-A481-42DD-A8B0-8AD43A5FD68B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6BA8F4AF-26C0-4A69-B489-16E7A56E5123", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FE82D53D-092D-4B36-A979-23E9A5E07A78", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "27365383-72DB-4683-9A67-CF553FF2620A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "46EE63D4-CA9C-4DF4-AF85-B8AC2E3F844A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "91407E03-4E98-4DD9-B584-E5BB74F09B9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "669CC22C-45E5-40AB-9A95-D7DFD694B688", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "54A934AE-AB7C-4D10-8BA2-9C54410C648F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "7A7C5A8E-35E6-4B86-8502-1970031AB987", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "687ED3CE-67C4-410D-8AF4-C769015598F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "30E918CD-89C4-42DA-9709-E50E0A3FA736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "DA57FA15-D0D7-4A97-9C25-6F6566940098", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "A1C45300-A2CF-40E7-AB67-23DC24C31A1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "958081DC-1D77-45CD-A940-C7A1AB42C7BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "298A879D-4F65-4523-A752-D17C4F81B822", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "37AB07BE-54C4-4972-A05F-D1E2CF4363CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBC63564-A84E-463D-8312-DDF1C6B7796F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "62A0906E-B631-4F3A-9ABC-9A43A43220BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "C6314ADA-2849-416D-966E-C01C322EF904", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "8B6CB1DD-614A-4B3D-99AE-9B1341427024", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "CC95B04F-3746-4F1C-8428-A1FA10253E14", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "20819080-E0AB-4879-B4CF-A154D6F7EF6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C6C45753-E2CC-4F7C-B8DA-3D8CF255EA22", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5A080197-D6AA-4FDC-888E-51D1C8251E34", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "1F08D930-D4C1-4C63-875C-171C46AE97C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "1AA43D7D-AEAD-47CB-BFA5-B73004A1A7A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "B5ED5F6F-166D-4610-8939-A33AD45F1ADE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D40002A-564E-425C-BA2A-7C4A8F8DAFD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "521C4DB2-7127-4BA9-94FC-AB0E9E06FE2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "8C905DC1-8AB8-4D83-BB5B-FA4DABC58229", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "ECC74B5D-97A1-46FF-AFA3-5D5E4A0BF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "F2D98C7C-94A8-4348-AF22-04A41FB6F8EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "85D39A99-E9A6-4860-BC61-56CA2FC3238B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "845DA0A4-1983-4E82-99C8-B7FBF47C632E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "5A63FBB7-F1CF-4603-848F-980742D2ED36", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "10B2084F-3AF4-4008-899C-6C1E43715201", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "217C13A5-9F8A-4392-858F-2FC88B03EB0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "6B282462-900C-492E-98DE-65364E62F5E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "687784F0-9ACC-435D-81F9-1E1B0F61010C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "9D7D020C-FE32-408B-BE37-58835FD3D95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "39B7938F-7370-4F67-B0CD-1C14DE2E4E7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC587195-5973-423B-8BF9-3E0B27363B76", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.2:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "E65E012A-49B6-4796-B1FA-A83C9248D0EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "1FBE5780-D503-46D1-BE04-4CB7B662B5DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.6.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "9F4C24B7-22E3-4E56-9B9F-414101B627FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CB19323D-208F-45F9-85F3-BAA5D1BC3AA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "09334CAB-9ADB-49BB-BE83-BBAC6A7A9F47", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "DC6DEEF5-7277-4E38-9233-E3612CD77CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.6.1:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "1813B898-F957-40D7-AF9A-064FB57D5C82", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "75A0D613-3D04-4902-9707-E743F30CF1A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.7.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "C5D07DB0-7C6A-4490-8FD0-DC83568E0421", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "54AB61A7-E143-4BEC-8658-68FF615B007E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "F5552D1C-C05A-4B67-A025-BBD3022C7B9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "9B7F8B72-EEC9-4021-B320-8CB6E83856F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "38A0F946-6A51-4E4D-8E8A-CA6DF222289F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "9C7619B8-B986-4B24-BFFD-956A1A6780FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "21CF339A-A38B-40CE-9811-A6CE77B29025", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "13856847-32A8-401D-A6DC-8DB96AE739FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.9.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "C8E8F4ED-AA7B-4B19-8416-6BC0608C760D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.9.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "B7A900B2-0F3C-450E-8933-BDD5C9627EA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "0992625B-012F-40EA-9A20-6352E633F62B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "E3828876-DDB4-457D-8E50-43A4FF761005", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.10.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "79283554-AF08-44DC-BF98-446C47AA490A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "52B5F73C-174A-4A0B-8D14-EC10779FC884", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "54EBFD0B-686F-477F-8FF2-535F24A3348B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.11.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0961F130-FF8C-41C2-BF2E-9731ED9EB73B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.11.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9789FC49-DE20-4477-B9D5-12CB71F42E58", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F53B8453-F35A-49BE-8129-774BADF71BA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "CCB0C07E-DA2F-4169-848D-C3315CDC1CB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "410C43E6-5912-4C22-A592-7CF94402EEB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D50A355E-1B55-4DD2-8100-EB81AA6FC40E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "9ADF4230-EFEB-45EC-9C96-0262B4A3E459", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "5234531C-F69A-4B94-A480-147734206C5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "321C1066-6800-4488-A7C4-BE91FF738453", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9B51588-50A2-40B2-A007-06F57D38C7AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CDE2B00C-6AC0-4166-8A25-EFC42CE7F737", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "617FC4AF-D152-4EE1-828D-C2A6AD0DFD3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3A3FE6DC-17FD-4CEE-BDFB-9D4685640381", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert:*:*:*:*:*:*", "matchCriteriaId": "C63C46CC-02E2-40AF-8281-F2FB5D89823A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert1:*:*:*:*:*:*", "matchCriteriaId": "71BAF2A7-024D-475A-88C0-0F5ADE3CA286", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert2:*:*:*:*:*:*", "matchCriteriaId": "82F91FE8-C320-466B-AF08-67319A00A2BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert3:*:*:*:*:*:*", "matchCriteriaId": "DCFF0E1C-B455-4C18-8AA1-10408234327B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert4:*:*:*:*:*:*", "matchCriteriaId": "738F68B3-2C5E-4A09-8FF4-2D034ED0C54D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert5:*:*:*:*:*:*", "matchCriteriaId": "6A60C223-AD68-4BFF-91C1-2C7E9F727AA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert6:*:*:*:*:*:*", "matchCriteriaId": "4C313F81-8B38-4845-B1C7-CBB23D7C99B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert7:*:*:*:*:*:*", "matchCriteriaId": "A08731AB-1E43-48B9-AB4C-0B06A34D0807", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert8:*:*:*:*:*:*", "matchCriteriaId": "5A4FBB03-4A60-4A34-855B-74C5079F7769", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert9:*:*:*:*:*:*", "matchCriteriaId": "66E97D3F-3AEB-40EB-87E7-18EC7A84F0CA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "6372EEEA-2759-4B6A-BD03-D84DC956E80E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta1:digiumphones:*:*:*:*:*", "matchCriteriaId": "26DF0C53-9F6A-4233-B163-AEC1F9886387", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta2:digiumphones:*:*:*:*:*", "matchCriteriaId": "79A063D7-553F-486F-9079-D95C8047B05E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc1:digiumphones:*:*:*:*:*", "matchCriteriaId": "B606D854-FC06-4314-AD24-FEEA3796A0AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc2:digiumphones:*:*:*:*:*", "matchCriteriaId": "DEBB0786-D912-48D1-BC63-E0F87E078154", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc3:digiumphones:*:*:*:*:*", "matchCriteriaId": "1C39DD70-1220-4CC6-95B4-CE18CA5787CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "B0005F0B-9C87-4160-9416-A7C136FCD5AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc1:digiumphones:*:*:*:*:*", "matchCriteriaId": "12073B6A-14B1-490B-B267-A68194C68BDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc2:digiumphones:*:*:*:*:*", "matchCriteriaId": "198C92F2-8268-4045-B297-17E0D1F9726E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.1.1:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "BF86A1A0-D3D7-485A-A46C-7619F74CE821", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "5D3A3C00-EA83-4EF4-8681-DB5616132607", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc1:digiumphones:*:*:*:*:*", "matchCriteriaId": "5FE59F0F-44B0-4940-8368-F360EE610114", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc2:digiumphones:*:*:*:*:*", "matchCriteriaId": "3647F0E3-196F-486B-9BAB-75ED24A055ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc3:digiumphones:*:*:*:*:*", "matchCriteriaId": "1FBC4A5F-FB16-42B2-9689-25F8B3D0F521", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc4:digiumphones:*:*:*:*:*", "matchCriteriaId": "B788D6E2-78E8-4DE1-81F5-40D52263E7F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "51358F60-4D6C-4DBA-86B0-E12C48A67456", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc2:digiumphones:*:*:*:*:*", "matchCriteriaId": "D51C9952-97F4-4326-8F7D-34579D3686AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc3:digiumphones:*:*:*:*:*", "matchCriteriaId": "3711A75C-AF87-4A5C-8B35-1CF834C12D2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "E7FFD09D-21A3-4E98-B1FA-C7A16C243D91", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc1:digiumphones:*:*:*:*:*", "matchCriteriaId": "FAC6591A-BC5A-4CA9-90BC-0B686F74127B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc2:digiumphones:*:*:*:*:*", "matchCriteriaId": "01BAF29D-8679-40F3-AB6C-DA5C3787271C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "B42229C3-B18E-4D50-9B98-202CB1805CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc1:digiumphones:*:*:*:*:*", "matchCriteriaId": "15DF192B-A8D5-4FCC-B469-505A8FA11D00", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc2:digiumphones:*:*:*:*:*", "matchCriteriaId": "D24E01F7-604D-4D05-B698-3BDEF7B69EF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.1:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "A54A74F4-8A6C-4090-88C2-8AB5A606C59B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.5.2:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "E65E012A-49B6-4796-B1FA-A83C9248D0EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.6.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "9F4C24B7-22E3-4E56-9B9F-414101B627FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.6.1:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "1813B898-F957-40D7-AF9A-064FB57D5C82", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:10.7.0:*:digiumphones:*:*:*:*:*", "matchCriteriaId": "C5D07DB0-7C6A-4490-8FD0-DC83568E0421", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Asterisk Open Source 1.8.x before 1.8.19.1, 10.x before 10.11.1, and 11.x before 11.1.2; Certified Asterisk 1.8.11 before 1.8.11-cert10; and Asterisk Digiumphones 10.x-digiumphones before 10.11.1-digiumphones, when anonymous calls are enabled, allow remote attackers to cause a denial of service (resource consumption) by making anonymous calls from multiple sources and consequently adding many entries to the device state cache." }, { "lang": "es", "value": "Asterisk Open Source v1.8.x anteriores a v1.8.19.1, v10.x anteriores a v10.11.1, y v11.x anteriores a v11.1.2; Certified Asterisk v1.8.11 anteriores a v1.8.11-cert10; y Asterisk Digiumphones v10.x-digiumphones anteriores a v10.11.1-digiumphones, cuando est\u00e1n permitidas las llamadas an\u00f3nimas, permiten a atacantes remotos a provocar una denegaci\u00f3n de servicio(consumo de recursos) haciendo llamadas an\u00f3nimas desde m\u00faltiples fuentes y en consecuencia, a\u00f1adir varias entradas a la cach\u00e9 de estado del dispositivo." } ], "id": "CVE-2012-5977", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-01-04T15:55:02.447", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2012-015" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2013/dsa-2605" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-20175" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2012-015" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2013/dsa-2605" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-20175" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-14 20:15
Modified
2024-11-21 08:33
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk prior to versions 18.20.1, 20.5.1, and 21.0.1; as well as certified-asterisk prior to 18.9-cert6; Asterisk is susceptible to a DoS due to a race condition in the hello handshake phase of the DTLS protocol when handling DTLS-SRTP for media setup. This attack can be done continuously, thus denying new DTLS-SRTP encrypted calls during the attack. Abuse of this vulnerability may lead to a massive Denial of Service on vulnerable Asterisk servers for calls that rely on DTLS-SRTP. Commit d7d7764cb07c8a1872804321302ef93bf62cba05 contains a fix, which is part of versions 18.20.1, 20.5.1, 21.0.1, amd 18.9-cert6.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "A49E9157-3440-47C5-B730-B1F3BE7240C9", "versionEndExcluding": "18.20.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCA06EB6-E31A-43B2-A750-186255114B8F", "versionEndExcluding": "20.5.1", "versionStartIncluding": "19.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:21.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3E690E3-3E92-42ED-87DD-1C6B838A3FF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:13.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "2AFE2011-05AA-45A6-A561-65C6C664DA7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert1:*:*:*:*:*:*", "matchCriteriaId": "C1117AA4-CE6B-479B-9995-A9F71C430663", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert1-rc1:*:*:*:*:*:*", "matchCriteriaId": "775041BD-5C86-42B6-8B34-E1D5171B3D87", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert1-rc2:*:*:*:*:*:*", "matchCriteriaId": "55EC2877-2FF5-4777-B118-E764A94BCE56", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert1-rc3:*:*:*:*:*:*", "matchCriteriaId": "EB0392C9-A5E9-4D71-8B8D-63FB96E055A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert1-rc4:*:*:*:*:*:*", "matchCriteriaId": "09AF962D-D4BB-40BA-B435-A59E4402931C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert2:*:*:*:*:*:*", "matchCriteriaId": "559D1063-7F37-44F8-B5C6-94758B675FDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert3:*:*:*:*:*:*", "matchCriteriaId": "185B2B4B-B246-4379-906B-9BDA7CDD4400", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:13.13.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "73D3592D-3CE5-4462-9FE8-4BCB54E74B5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:13.13.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "B3CCE9E0-5DC4-43A2-96DB-9ABEA60EC157", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:-:*:*:*:*:*:*", "matchCriteriaId": "1EAD713A-CBA2-40C3-9DE3-5366827F18C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert1:*:*:*:*:*:*", "matchCriteriaId": "A5F5A8B7-29C9-403C-9561-7B3E96F9FCA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert10:*:*:*:*:*:*", "matchCriteriaId": "F9B96A53-2263-463C-9CCA-0F29865FE500", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert11:*:*:*:*:*:*", "matchCriteriaId": "A53049F1-8551-453E-834A-68826A7AA959", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert12:*:*:*:*:*:*", "matchCriteriaId": "B224A4E9-4B6B-4187-B0D6-E4BAE2637960", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert2:*:*:*:*:*:*", "matchCriteriaId": "9501DBFF-516D-4F26-BBF6-1B453EE2A630", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert3:*:*:*:*:*:*", "matchCriteriaId": "9D3E9AC0-C0B4-4E87-8D48-2B688D28B678", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert4:*:*:*:*:*:*", "matchCriteriaId": "1A8628F6-F8D1-4C0C-BD89-8E2EEF19A5F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert5:*:*:*:*:*:*", "matchCriteriaId": "E27A6FD1-9321-4C9E-B32B-D6330CD3DC92", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert6:*:*:*:*:*:*", "matchCriteriaId": "B6BF5EDB-9D17-453D-A22E-FDDC4DCDD85B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert7:*:*:*:*:*:*", "matchCriteriaId": "4C75A21E-5D05-434B-93DE-8DAC4DD3E587", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert8:*:*:*:*:*:*", "matchCriteriaId": "1D725758-C9F5-4DB2-8C45-CC052518D3FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert9:*:*:*:*:*:*", "matchCriteriaId": "B5E2AECC-B681-4EA5-9DE5-2086BB37A5F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:18.9:cert1:*:*:*:*:*:*", "matchCriteriaId": "79EEB5E5-B79E-454B-8DCD-3272BA337A9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:18.9:cert2:*:*:*:*:*:*", "matchCriteriaId": "892BAE5D-A64E-4FE0-9A99-8C07F342A042", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:18.9:cert3:*:*:*:*:*:*", "matchCriteriaId": "1A716A45-7075-4CA6-9EF5-2DD088248A5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:18.9:cert4:*:*:*:*:*:*", "matchCriteriaId": "80EFA05B-E22D-49CE-BDD6-5C7123F1C12B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sangoma:certified_asterisk:18.9:cert5:*:*:*:*:*:*", "matchCriteriaId": "20FD475F-2B46-47C9-B535-1561E29CB7A1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk prior to versions 18.20.1, 20.5.1, and 21.0.1; as well as certified-asterisk prior to 18.9-cert6; Asterisk is susceptible to a DoS due to a race condition in the hello handshake phase of the DTLS protocol when handling DTLS-SRTP for media setup. This attack can be done continuously, thus denying new DTLS-SRTP encrypted calls during the attack. Abuse of this vulnerability may lead to a massive Denial of Service on vulnerable Asterisk servers for calls that rely on DTLS-SRTP. Commit d7d7764cb07c8a1872804321302ef93bf62cba05 contains a fix, which is part of versions 18.20.1, 20.5.1, 21.0.1, amd 18.9-cert6." }, { "lang": "es", "value": "Asterisk es un conjunto de herramientas de telefon\u00eda y centralita privada de c\u00f3digo abierto. En Asterisk anteriores a las versiones 18.20.1, 20.5.1 y 21.0.1; as\u00ed como certificado-asterisco anterior a 18.9-cert6; Asterisk es susceptible a un DoS debido a una condici\u00f3n de ejecuci\u00f3n en la fase \"hello handshake\" del protocolo DTLS cuando maneja DTLS-SRTP para la configuraci\u00f3n de medios. Este ataque se puede realizar de forma continua, negando as\u00ed nuevas llamadas cifradas DTLS-SRTP durante el ataque. El abuso de esta vulnerabilidad puede provocar una denegaci\u00f3n de servicio masiva en servidores Asterisk vulnerables para llamadas que dependen de DTLS-SRTP. El commit d7d7764cb07c8a1872804321302ef93bf62cba05 contiene una soluci\u00f3n, que forma parte de las versiones 18.20.1, 20.5.1, 21.0.1, amd 18.9-cert6." } ], "id": "CVE-2023-49786", "lastModified": "2024-11-21T08:33:50.533", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-14T20:15:52.927", "references": [ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/176251/Asterisk-20.1.0-Denial-Of-Service.html" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2023/Dec/24" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2023/12/15/7" }, { "source": "security-advisories@github.com", "tags": [ "Exploit" ], "url": "https://github.com/EnableSecurity/advisories/tree/master/ES2023-01-asterisk-dtls-hello-race" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/asterisk/asterisk/commit/d7d7764cb07c8a1872804321302ef93bf62cba05" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-hxj9-xwr8-w8pq" }, { "source": "security-advisories@github.com", "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/176251/Asterisk-20.1.0-Denial-Of-Service.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2023/Dec/24" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2023/12/15/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/EnableSecurity/advisories/tree/master/ES2023-01-asterisk-dtls-hello-race" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/asterisk/asterisk/commit/d7d7764cb07c8a1872804321302ef93bf62cba05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-hxj9-xwr8-w8pq" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-703" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-08-24 20:04
Modified
2025-04-03 01:03
Severity ?
Summary
Stack-based buffer overflow in channels/chan_mgcp.c in MGCP in Asterisk 1.0 through 1.2.10 allows remote attackers to execute arbitrary code via a crafted audit endpoint (AUEP) response.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digium | asterisk | 1.0.0 | |
digium | asterisk | 1.0.1 | |
digium | asterisk | 1.0.2 | |
digium | asterisk | 1.0.3 | |
digium | asterisk | 1.0.4 | |
digium | asterisk | 1.0.5 | |
digium | asterisk | 1.0.6 | |
digium | asterisk | 1.0.7 | |
digium | asterisk | 1.0.8 | |
digium | asterisk | 1.0.9 | |
digium | asterisk | 1.0.10 | |
digium | asterisk | 1.0_rc1 | |
digium | asterisk | 1.0_rc2 | |
digium | asterisk | 1.2.0_beta1 | |
digium | asterisk | 1.2.0_beta2 | |
digium | asterisk | 1.2.6 | |
digium | asterisk | 1.2.7 | |
digium | asterisk | 1.2.8 | |
digium | asterisk | 1.2.9 | |
digium | asterisk | 1.2.10 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "E9A92B4D-16A7-4D99-8F3A-2E5D3B12C86B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "16783925-8EC5-431F-90B5-93B16DCC10B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9C59AF9E-FEC7-44AB-B392-49DB11BAEB0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "325C4452-6541-46F6-A86C-6D6987583FB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5424B5B4-99B3-4695-8E0D-7E8DC8B88C3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "62BDF9F0-1AFD-47E6-9054-A9FC6D422DD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "5A8D2125-019A-4B73-9E1A-98E745148803", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "46C60C04-EF59-4F5C-96E5-A6E693EA9A06", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3636BB44-DF4D-40AB-8EBB-1EC5D911E4A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "B3B3C254-29D9-4911-89A9-AC0CD9EB13F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "4D8679FD-B2E5-46F6-B20C-F109B9706C63", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.0_rc1:*:*:*:*:*:*:*", "matchCriteriaId": "E49F2D76-DC82-4289-8891-4982795D896A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.0_rc2:*:*:*:*:*:*:*", "matchCriteriaId": "203237E0-BB44-42D0-B65B-CBDAAA68A1BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.0_beta1:*:*:*:*:*:*:*", "matchCriteriaId": "4042CC21-F3CB-4C77-9E60-AF8AA9A191C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.0_beta2:*:*:*:*:*:*:*", "matchCriteriaId": "C656168D-7D6A-4E84-9196-A8B170E1F7CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "C619138A-557F-419E-9832-D0FB0E9042C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "B6656EA0-4D4F-4251-A30F-48375C5CE3E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "4AAD9104-BA4A-478F-9B56-195E0F9A7DF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "4F06C361-D7DF-474B-A835-BA8886C11A80", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "175954A5-E712-41B8-BC11-4F999343063D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in channels/chan_mgcp.c in MGCP in Asterisk 1.0 through 1.2.10 allows remote attackers to execute arbitrary code via a crafted audit endpoint (AUEP) response." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en channels/chan_mgcp.c de MGCP en Asterisk 1.0 hasta 1.2.10 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante una respuesta de fin de auditor\u00eda (audit endpoint) (AUEP) manipulada." } ], "id": "CVE-2006-4345", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-08-24T20:04:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://ftp.digium.com/pub/asterisk/ChangeLog-1.2.11" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://labs.musecurity.com/advisories/MU-200608-01.txt" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21600" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/22651" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1016742" }, { "source": "cve@mitre.org", "url": "http://www.gentoo.org/security/en/glsa/glsa-200610-15.xml" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/444322/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/19683" }, { "source": "cve@mitre.org", "url": "http://www.sineapps.com/news.php?rssid=1448" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/3372" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28542" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ftp.digium.com/pub/asterisk/ChangeLog-1.2.11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://labs.musecurity.com/advisories/MU-200608-01.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21600" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/22651" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1016742" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.gentoo.org/security/en/glsa/glsa-200610-15.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/444322/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/19683" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.sineapps.com/news.php?rssid=1448" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/3372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28542" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-09-02 16:29
Modified
2025-04-20 01:37
Severity ?
Summary
In the pjsip channel driver (res_pjsip) in Asterisk 13.x before 13.17.1 and 14.x before 14.6.1, a carefully crafted tel URI in a From, To, or Contact header could cause Asterisk to crash.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:13.0.0:*:*:*:lts:*:*:*", "matchCriteriaId": "E7D1238A-A8D2-485E-81FD-46038A883EC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "E93A7967-9A04-424A-BDDB-A2B8289B9AC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "8F75C9FF-6F95-4F6A-B683-FE2BEDE3AD10", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "68226156-42ED-4F0E-93E1-02DD57E582B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FB2C4E1E-6B90-4DCC-BC09-7D19FBA65C3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A4EB385E-28B5-4259-9431-99E1F32D61B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "58C0FF1B-6188-4181-A139-1806328762BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "890EBB8C-989B-4344-AC03-62B399076008", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "BD4AAECB-A2BC-45BA-BC63-E51C1FE6C334", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "121EACD3-D5E3-4691-8024-95996865BB65", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "136D6508-660E-410D-829A-7DD452BF8819", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "AEC2B3AA-EB24-4259-BED1-5DBC102FE9C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "74B23D17-7356-4D37-8C73-E87896D1335B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CEA9DA4A-A3E6-4C46-9471-CCBFA71083AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "81A8A6CB-D236-4AB3-8476-C2D34DB7EF31", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "599833A2-CBE9-479B-8A6E-AF79C5EED1DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B55719B3-7325-47E1-8D16-3F34B1F44385", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B870B3B7-E8DC-45A2-8FA4-657D005D00E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "C91E9A3B-54EB-4819-94DD-30F7D0C90047", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "47189DF9-8E57-4BA6-9F52-B7A8229AE02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "84AAFA3C-3CCD-4615-9725-169C303CF18F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "C92E0801-9E8F-4CF2-A4A0-48BCF550F2D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "5C1C39FA-EF1A-4F2B-87A0-A00BAE73C6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "677D1211-0B07-47B9-AB7A-E820E2B29561", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "84202BAF-29E1-472B-B11F-B73F6A8891CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "FFC7120D-E6A0-4801-A1CC-3E143896EE72", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "BAF2A83D-D9AE-441D-8D4E-335BF9D28A63", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "7F5C1479-A540-4B7D-B00C-BD35EEC83BB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "AC12556C-5E82-47D7-87E5-FBDC01A920DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "461C1D2D-C4C1-4FF8-8231-38A2505F3523", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "66595711-8573-4A9B-A8FE-4943E3097AA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5D1FE3D4-A0B9-475A-9B89-B0222283A6A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "9670B5AC-CBD1-484C-90F8-69B1A60B6054", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "EE5794B6-246C-415E-8E20-56447F152488", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "E726CA39-A763-4422-B59E-E9E12518EA4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.12:*:*:*:*:*:*:*", "matchCriteriaId": "6A96EB57-835A-45B4-82F5-31F925A85629", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "206F1DC9-9E8F-4497-A354-4A14711993DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "8D428364-E2AD-4BC6-9329-71793BC0EB61", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "08963910-E0BD-4487-B669-60E0BFA79863", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.13:*:*:*:*:*:*:*", "matchCriteriaId": "86B16D04-3808-4380-8F64-0C36B185C1F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "F3BD16A9-24BC-4FC1-81BA-A6D1FEF38D35", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "68BAAD53-DE75-41CA-BF60-C0363029D3A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "CDC383B3-27EF-4C37-94BE-F0D41B34CAFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.14.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "A7824B34-06C3-403B-B6F3-C850D54438EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.14.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "17E86941-98F6-45A5-8646-6876F74D909F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "C6DB27C0-C74E-4E6A-AA63-09CFE73C2EF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "6C443A3B-DF96-4A68-B046-DE13689CA974", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.15.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5F3AC9AE-288C-4F0E-BF15-C3F4AF09D8E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.15.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "796A6021-9FCA-4354-A47C-7500C363C168", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.15.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "EBB9D073-195F-4C2A-932E-7F027710DB25", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "604E58C8-9B81-4992-8993-4A6CB876EE08", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "077C4CB8-1FDE-45D3-82E6-CE09A22809B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.16.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3CDB96CA-5AAE-4B39-8E01-2E72E3B476AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.16.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "8EB33EC3-CDE0-40BD-B269-512AE074D278", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "363FA95F-03EF-4D6A-A40D-76D285D16255", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.17.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "FA96DC31-4BAC-4C5A-923C-EBBFFC7ABB52", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:14.0:*:*:*:*:*:*:*", "matchCriteriaId": "C949D5F5-6C0B-4B17-85B6-3A77D08CF967", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D413741-BDB7-496D-A01B-75E2A98FDB5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "29130F7F-DE00-43E1-A4A6-8F1F95D5CB19", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "25E94EC0-F577-4B2B-8B11-DC76278CDD42", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "101AD474-9B89-483D-84E8-08012677C55C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D57E41F6-C2CF-4183-A78A-9531A88FB65D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FB1F9BB8-F951-427E-B770-69C2ACEBDB28", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C4CE405-E923-4C9C-849A-D1031C4DB493", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.1:*:*:*:*:*:*:*", "matchCriteriaId": "C039C0CE-9C9C-4D85-8D7C-574DCF9D920B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.01:*:*:*:*:*:*:*", "matchCriteriaId": "A1B2F2CC-18C3-46E7-8E7F-970622A710C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "04ECDFF1-9718-4FAE-B45B-4F8CCA82829E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D2C4DA60-5701-4BD0-B2F9-D93B9E64111F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "0B12834D-2AF1-4AD1-AB23-859CAA5D3210", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.02:*:*:*:*:*:*:*", "matchCriteriaId": "89036D04-EA04-4041-9694-6768478D35F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.2:*:*:*:*:*:*:*", "matchCriteriaId": "B19070D3-9F03-43C7-9F31-9A54BD5F2441", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E39BAA74-50A8-4087-8FF8-7C5922121319", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D29C253-B403-4B00-A626-3E3A920DC018", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E9D8FA2-21EA-4384-8001-118DA7C959F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3368DE88-7009-46A0-93F4-4D52BAD3D173", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "26586127-B68B-4476-8182-C49B1B1DCDC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D1EFDCC-983E-4227-9FD5-456C16610BC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "DFA7DBAD-BCA6-47D1-A92E-4EB7941F55F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "02C6C827-97A6-4287-8B3E-DE29054242B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.4.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "9BE4F7C1-BB82-44BA-BBFD-9F660330EC15", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.4.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "E4FCA146-5A72-4746-BE23-63271FBC4D47", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4A0C90BB-C3FE-4A75-B739-0236C4256F7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "46BD9466-0BC9-4B4D-928F-240CD46D306C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "06F456AD-19D3-49EF-82B1-07370F6499AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.5.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "24A9997E-D0DC-45B0-B4DB-308667FA820E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "26202E79-98E0-4533-B4AE-1ABB2477F5A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "C3D7384F-DF1B-4ED7-B1D5-885B95774DDB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the pjsip channel driver (res_pjsip) in Asterisk 13.x before 13.17.1 and 14.x before 14.6.1, a carefully crafted tel URI in a From, To, or Contact header could cause Asterisk to crash." }, { "lang": "es", "value": "En el controlador de canal pjsip (res_pjsip) en Asterisk 13.x en versiones anteriores a la 13.17.1 y 14.x en versiones anteriores a la 14.6.1, una URI tel cuidadosamente manipulada en un encabezado From, To, o Contact podr\u00eda provocar el bloqueo de Asterisk." } ], "id": "CVE-2017-14098", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-09-02T16:29:00.240", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2017-007.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100583" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039253" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.debian.org/873909" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27152" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2017-007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100583" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039253" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.debian.org/873909" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27152" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-03-28 17:29
Modified
2024-11-21 04:47
Severity ?
Summary
An Integer Signedness issue (for a return code) in the res_pjsip_sdp_rtp module in Digium Asterisk versions 15.7.1 and earlier and 16.1.1 and earlier allows remote authenticated users to crash Asterisk via a specially crafted SDP protocol violation.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://downloads.asterisk.org/pub/security/AST-2019-001.html | Patch, Vendor Advisory | |
cve@mitre.org | https://issues.asterisk.org/jira/browse/ASTERISK-28260 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://downloads.asterisk.org/pub/security/AST-2019-001.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://issues.asterisk.org/jira/browse/ASTERISK-28260 | Issue Tracking, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "212B9BDD-ECC4-4CA3-B776-556C98EADF1D", "versionEndExcluding": "15.7.2", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "78874405-4758-4CC0-8BE0-ECC799BFF7B5", "versionEndExcluding": "16.2.1", "versionStartIncluding": "16.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Integer Signedness issue (for a return code) in the res_pjsip_sdp_rtp module in Digium Asterisk versions 15.7.1 and earlier and 16.1.1 and earlier allows remote authenticated users to crash Asterisk via a specially crafted SDP protocol violation." }, { "lang": "es", "value": "Un error en la propiedad signedness de un n\u00famero entero (para c\u00f3digo devuelto) en el m\u00f3dulo res_pjsip_sdp_rtp en Digium Asterisk, en versiones 15.7.1 y anteriores y en las 16.1.1 y anteriores, permite a los atacantes remotos no autenticados cerrar inesperadamente Asterisk mediante una violaci\u00f3n de protocolo SDP especialmente manipulada." } ], "id": "CVE-2019-7251", "lastModified": "2024-11-21T04:47:50.583", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-03-28T17:29:01.723", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/AST-2019-001.html" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-28260" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/AST-2019-001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-28260" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-04-10 14:59
Modified
2025-04-20 01:37
Severity ?
Summary
Remote code execution can occur in Asterisk Open Source 13.x before 13.14.1 and 14.x before 14.3.1 and Certified Asterisk 13.13 before 13.13-cert3 because of a buffer overflow in a CDR user field, related to X-ClientCode in chan_sip, the CDR dialplan function, and the AMI Monitor action.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://downloads.asterisk.org/pub/security/AST-2017-001.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/97377 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://bugs.debian.org/859910 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://downloads.asterisk.org/pub/security/AST-2017-001.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/97377 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.debian.org/859910 | Patch, Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:13.0.0:*:*:*:lts:*:*:*", "matchCriteriaId": "E7D1238A-A8D2-485E-81FD-46038A883EC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "E93A7967-9A04-424A-BDDB-A2B8289B9AC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "8F75C9FF-6F95-4F6A-B683-FE2BEDE3AD10", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "68226156-42ED-4F0E-93E1-02DD57E582B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FB2C4E1E-6B90-4DCC-BC09-7D19FBA65C3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A4EB385E-28B5-4259-9431-99E1F32D61B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "58C0FF1B-6188-4181-A139-1806328762BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "890EBB8C-989B-4344-AC03-62B399076008", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "BD4AAECB-A2BC-45BA-BC63-E51C1FE6C334", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "121EACD3-D5E3-4691-8024-95996865BB65", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "136D6508-660E-410D-829A-7DD452BF8819", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "AEC2B3AA-EB24-4259-BED1-5DBC102FE9C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "74B23D17-7356-4D37-8C73-E87896D1335B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CEA9DA4A-A3E6-4C46-9471-CCBFA71083AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "81A8A6CB-D236-4AB3-8476-C2D34DB7EF31", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "599833A2-CBE9-479B-8A6E-AF79C5EED1DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B55719B3-7325-47E1-8D16-3F34B1F44385", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B870B3B7-E8DC-45A2-8FA4-657D005D00E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "C91E9A3B-54EB-4819-94DD-30F7D0C90047", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "47189DF9-8E57-4BA6-9F52-B7A8229AE02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "84AAFA3C-3CCD-4615-9725-169C303CF18F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "C92E0801-9E8F-4CF2-A4A0-48BCF550F2D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "5C1C39FA-EF1A-4F2B-87A0-A00BAE73C6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "677D1211-0B07-47B9-AB7A-E820E2B29561", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "84202BAF-29E1-472B-B11F-B73F6A8891CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "FFC7120D-E6A0-4801-A1CC-3E143896EE72", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "BAF2A83D-D9AE-441D-8D4E-335BF9D28A63", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "7F5C1479-A540-4B7D-B00C-BD35EEC83BB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "AC12556C-5E82-47D7-87E5-FBDC01A920DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "461C1D2D-C4C1-4FF8-8231-38A2505F3523", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "66595711-8573-4A9B-A8FE-4943E3097AA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5D1FE3D4-A0B9-475A-9B89-B0222283A6A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "9670B5AC-CBD1-484C-90F8-69B1A60B6054", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "EE5794B6-246C-415E-8E20-56447F152488", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "E726CA39-A763-4422-B59E-E9E12518EA4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.12:*:*:*:*:*:*:*", "matchCriteriaId": "6A96EB57-835A-45B4-82F5-31F925A85629", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "206F1DC9-9E8F-4497-A354-4A14711993DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "8D428364-E2AD-4BC6-9329-71793BC0EB61", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "08963910-E0BD-4487-B669-60E0BFA79863", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.13:*:*:*:*:*:*:*", "matchCriteriaId": "86B16D04-3808-4380-8F64-0C36B185C1F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "F3BD16A9-24BC-4FC1-81BA-A6D1FEF38D35", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "CDC383B3-27EF-4C37-94BE-F0D41B34CAFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.0:*:*:*:*:*:*:*", "matchCriteriaId": "C949D5F5-6C0B-4B17-85B6-3A77D08CF967", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D413741-BDB7-496D-A01B-75E2A98FDB5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "29130F7F-DE00-43E1-A4A6-8F1F95D5CB19", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "25E94EC0-F577-4B2B-8B11-DC76278CDD42", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "101AD474-9B89-483D-84E8-08012677C55C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D57E41F6-C2CF-4183-A78A-9531A88FB65D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FB1F9BB8-F951-427E-B770-69C2ACEBDB28", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C4CE405-E923-4C9C-849A-D1031C4DB493", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.1:*:*:*:*:*:*:*", "matchCriteriaId": "C039C0CE-9C9C-4D85-8D7C-574DCF9D920B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.01:*:*:*:*:*:*:*", "matchCriteriaId": "A1B2F2CC-18C3-46E7-8E7F-970622A710C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "04ECDFF1-9718-4FAE-B45B-4F8CCA82829E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D2C4DA60-5701-4BD0-B2F9-D93B9E64111F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "0B12834D-2AF1-4AD1-AB23-859CAA5D3210", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.02:*:*:*:*:*:*:*", "matchCriteriaId": "89036D04-EA04-4041-9694-6768478D35F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.2:*:*:*:*:*:*:*", "matchCriteriaId": "B19070D3-9F03-43C7-9F31-9A54BD5F2441", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E39BAA74-50A8-4087-8FF8-7C5922121319", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D29C253-B403-4B00-A626-3E3A920DC018", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:14.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E9D8FA2-21EA-4384-8001-118DA7C959F0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:certified_asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C30F0A0-EE30-496A-ACF0-A9B1BCA46D73", "versionEndIncluding": "13.13-cert2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Remote code execution can occur in Asterisk Open Source 13.x before 13.14.1 and 14.x before 14.3.1 and Certified Asterisk 13.13 before 13.13-cert3 because of a buffer overflow in a CDR user field, related to X-ClientCode in chan_sip, the CDR dialplan function, and the AMI Monitor action." }, { "lang": "es", "value": "La ejecuci\u00f3n remota de c\u00f3digo puede ocurrir en Asterisk Open Source 13.x en versiones anteriores a 13.14.1 y 14.x en versiones anteriores a 14.3.1 y Asterisk certificado 13.13 en versiones anteriores a 13.13-cert3 debido a un desbordamiento de b\u00fafer en un campo de usuario de CDR, relacionado con X-ClientCode en chan_sip , La funci\u00f3n de dialplan CDR y la acci\u00f3n Monitor AMI." } ], "id": "CVE-2017-7617", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-10T14:59:00.327", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2017-001.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97377" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://bugs.debian.org/859910" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2017-001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97377" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://bugs.debian.org/859910" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-01-20 19:00
Modified
2025-04-11 00:51
Severity ?
Summary
Stack-based buffer overflow in the ast_uri_encode function in main/utils.c in Asterisk Open Source before 1.4.38.1, 1.4.39.1, 1.6.1.21, 1.6.2.15.1, 1.6.2.16.1, 1.8.1.2, 1.8.2.; and Business Edition before C.3.6.2; when running in pedantic mode allows remote authenticated users to execute arbitrary code via crafted caller ID data in vectors involving the (1) SIP channel driver, (2) URIENCODE dialplan function, or (3) AGI dialplan function.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digium | asterisk | * | |
digium | asterisk | * | |
digium | asterisk | * | |
digium | asterisk | * | |
digium | asterisk | * | |
digium | asterisk | * | |
digium | asterisk | * | |
digium | asterisk | * | |
digium | asterisk | * | |
digium | asterisknow | 1.5 | |
fedoraproject | fedora | 13 | |
fedoraproject | fedora | 14 | |
debian | debian_linux | 6.0 | |
digium | s800i_firmware | 1.2.0 | |
digium | s800i | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:business:*:*:*", "matchCriteriaId": "FA6C77B1-85FF-47C1-8E1F-CABFF1DEA5FE", "versionEndExcluding": "c.3.6.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "4CF68F51-2011-4CEE-A4EA-49A59E440BAA", "versionEndIncluding": "1.2.40", "versionStartIncluding": "1.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0CCB255-0F1A-4FBE-A04D-A9560D3DF3BE", "versionEndExcluding": "1.4.38.1", "versionStartIncluding": "1.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "F3CEB89D-1D84-4B8E-B476-E00726752766", "versionEndExcluding": "1.4.39.1", "versionStartIncluding": "1.4.39", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0F92DAC-5736-49A6-9C52-2330BC4B724B", "versionEndExcluding": "1.6.1.21", "versionStartIncluding": "1.6.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "71755241-9AF8-43EE-BD9F-9FF4DFD808D4", "versionEndExcluding": "1.6.2.15.1", "versionStartIncluding": "1.6.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "007C363A-CBC6-4A05-BD3E-74A5A530B281", "versionEndExcluding": "1.6.2.16.1", "versionStartIncluding": "1.6.2.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "35488043-2E09-4286-A178-4A25AA5C364F", "versionEndExcluding": "1.8.1.2", "versionStartIncluding": "1.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "AADFA817-D1C7-49D2-AE6D-55493145BAFF", "versionEndExcluding": "1.8.2.2", "versionStartIncluding": "1.8.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisknow:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "FF81215F-0DD3-48FC-BA1C-19E42FCD47B5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*", "matchCriteriaId": "A2D59BD0-43DE-4E58-A057-640AB98359A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*", "matchCriteriaId": "BDE52846-24EC-4068-B788-EC7F915FFF11", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:digium:s800i_firmware:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "8AA18EB6-92D5-4B01-A4BC-2B7177D28C40", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:digium:s800i:-:*:*:*:*:*:*:*", "matchCriteriaId": "15C35F93-0E57-4AEB-AA5F-4EDFAE753451", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the ast_uri_encode function in main/utils.c in Asterisk Open Source before 1.4.38.1, 1.4.39.1, 1.6.1.21, 1.6.2.15.1, 1.6.2.16.1, 1.8.1.2, 1.8.2.; and Business Edition before C.3.6.2; when running in pedantic mode allows remote authenticated users to execute arbitrary code via crafted caller ID data in vectors involving the (1) SIP channel driver, (2) URIENCODE dialplan function, or (3) AGI dialplan function." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en la funci\u00f3n ast_uri_encode, en main/utils.c, en Asterisk Open Source before v.1.4.38.1, v.1.4.39.1, v.1.6.1.21, v.1.6.2.15.1, v.1.6.2.16.1, v.1.8.1.2, v.1.8.2.; y Business Edition before v.C.3.6.2; cuando se ejecuta en modo \"pedantic\" permite a usuarios autenticados ejectuar c\u00f3digo de su elecci\u00f3n manipulados con el dato llamador ID en vectores que involucran el (1) el driver del SIP, (2) la funci\u00f3n URIENCODE dialplan, o la funci\u00f3n AGI dialplan." } ], "id": "CVE-2011-0495", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-20T19:00:08.600", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2011-001-1.6.2.diff" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2011-001.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053689.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053713.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://osvdb.org/70518" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/42935" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/43119" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/43373" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2011/dsa-2171" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/515781/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/45839" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2011/0159" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2011/0281" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2011/0449" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64831" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2011-001-1.6.2.diff" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2011-001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053689.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053713.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://osvdb.org/70518" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/42935" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/43119" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/43373" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2011/dsa-2171" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/515781/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/45839" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2011/0159" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2011/0281" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2011/0449" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64831" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-11-24 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
The DB dialplan function in Asterisk Open Source 1.8.x before 1.8.32, 11.x before 11.1.4.1, 12.x before 12.7.1, and 13.x before 13.0.1 and Certified Asterisk 1.8 before 1.8.28-cert8 and 11.6 before 11.6-cert8 allows remote authenticated users to gain privileges via a call from an external protocol, as demonstrated by the AMI protocol.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digium | certified_asterisk | 1.8.28 | |
digium | certified_asterisk | 1.8.28 | |
digium | certified_asterisk | 1.8.28 | |
digium | certified_asterisk | 1.8.28 | |
digium | certified_asterisk | 1.8.28 | |
digium | certified_asterisk | 1.8.28 | |
digium | certified_asterisk | 1.8.28 | |
digium | certified_asterisk | 1.8.28 | |
digium | certified_asterisk | 11.6 | |
digium | certified_asterisk | 11.6 | |
digium | certified_asterisk | 11.6 | |
digium | certified_asterisk | 11.6 | |
digium | certified_asterisk | 11.6 | |
digium | certified_asterisk | 11.6 | |
digium | certified_asterisk | 11.6 | |
digium | certified_asterisk | 11.6.0 | |
digium | asterisk | * | |
digium | asterisk | * | |
digium | asterisk | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.28:*:*:*:*:*:*:*", "matchCriteriaId": "9365B811-5620-42F0-9400-5EA49361D2B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.28:cert1:*:*:lts:*:*:*", "matchCriteriaId": "E63726F0-3BC6-49E7-BDE9-71196B480149", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.28:cert1-rc1:*:*:*:*:*:*", "matchCriteriaId": "536ECC06-D2DC-474F-AB44-7A8B16ADFC9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.28:cert2:*:*:*:*:*:*", "matchCriteriaId": "6001EFB8-A539-4F3C-B9F3-7A513FA458BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.28:cert2:*:*:lts:*:*:*", "matchCriteriaId": "677AB746-AE4F-46B0-BEE3-82A1FE77271F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.28:cert3:*:*:*:*:*:*", "matchCriteriaId": "1035C6D2-E8FD-4FFA-9AC7-17534609D68C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.28:cert4:*:*:*:*:*:*", "matchCriteriaId": "DBD12EE0-78F6-450F-9AD9-D64A55377D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.28:cert5:*:*:*:*:*:*", "matchCriteriaId": "BFA21D5A-0BC6-45E0-AD84-F91F185275B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:*:*:*:*", "matchCriteriaId": "322694EF-B086-4BE7-A9F0-41D3A9C245FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:*:*:*:*", "matchCriteriaId": "013B1940-C45D-4FE2-8B49-D92B8F1A9048", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:*:*:*:*", "matchCriteriaId": "A98B11B5-B8E2-4903-B4F7-3AC23751AE8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert4:*:*:*:*:*:*", "matchCriteriaId": "C7D60B24-C509-49C3-87A9-49D05CB44183", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert5:*:*:*:*:*:*", "matchCriteriaId": "3C1F9978-44E7-4D39-BEC6-5C6DB7F893E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert6:*:*:*:*:*:*", "matchCriteriaId": "69BA61A8-2A95-4800-BB4E-692BA4321A84", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert7:*:*:*:*:*:*", "matchCriteriaId": "C481D8B0-622D-491D-B292-717B0369B507", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6.0:-:*:*:*:*:*:*", "matchCriteriaId": "CCDDF5C2-9B45-4811-90F6-984EF4B220CF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9569F80-CCA9-4010-8B72-0BF9F4654150", "versionEndIncluding": "1.8.32.0", "versionStartIncluding": "1.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CDFB271-72DA-4E23-87A0-E50EE633843F", "versionEndExcluding": "11.14.1", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "F21F0B73-A30F-4673-B3A8-D9F456FFCEF2", "versionEndExcluding": "12.7.1", "versionStartIncluding": "12.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The DB dialplan function in Asterisk Open Source 1.8.x before 1.8.32, 11.x before 11.1.4.1, 12.x before 12.7.1, and 13.x before 13.0.1 and Certified Asterisk 1.8 before 1.8.28-cert8 and 11.6 before 11.6-cert8 allows remote authenticated users to gain privileges via a call from an external protocol, as demonstrated by the AMI protocol." }, { "lang": "es", "value": "La funci\u00f3n DB dialplan en Asterisk Open Source 1.8.x anterior a 1.8.32, 11.x anterior a 11.1.4.1, 12.x anterior a 12.7.1, y 13.x anterior a 13.0.1 y Certified Asterisk 1.8 anterior a 1.8.28-cert8 y 11.6 anterior a 11.6-cert8 permite a usuarios remotos autenticados ganar privilegios a trav\u00e9s de una llamada de un protocolo externo, tal y como fue demostrado por el protocolo AMI." } ], "id": "CVE-2014-8418", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-11-24T15:59:10.157", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2014-018.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-02-22 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
Asterisk Open Source 1.8.x, 11.x before 11.21.1, 12.x, and 13.x before 13.7.1 and Certified Asterisk 1.8.28, 11.6 before 11.6-cert12, and 13.1 before 13.1-cert3 allow remote authenticated users to cause a denial of service (uninitialized pointer dereference and crash) via a zero length error correcting redundancy packet for a UDPTL FAX packet that is lost.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6344E43-E8AA-4340-B3A7-72F5D6A5D184", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "4C170C1C-909D-4439-91B5-DB1A9CD150C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EE821BE5-B1D3-4854-A700-3A83E5F15724", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "149C57CA-0B4B-4220-87FC-432418D1C393", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "035595D5-BBEC-4D85-AD7A-A2C932D2BA70", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "6DAF5655-F09F-47F8-AFA6-4B95F77A57F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F8E001D8-0A7B-4FDD-88E3-E124ED32B81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9D5CFFBD-785F-4417-A54A-F3565FD6E736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "D30EF999-92D1-4B19-8E32-1E4B35DE4EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "A67D156B-9C43-444F-ADEC-B21D99D1433C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "893EB152-6444-43DB-8714-9735354C873A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8447EE7-A834-41D7-9204-07BD3752870C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C04F2C9-5672-42F2-B664-A3EE4C954C29", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "33465668-4C91-4619-960A-D26D77853E53", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "CAD08674-0B44-44EA-940B-6812E2D5077D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "EEE87710-A129-43AA-BA08-8001848975FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F582C6E-5DA0-4D72-A40E-66BDBC5CF2B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CEBB8-01B3-4A05-AFE8-37A143C9833E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "522733A7-E89E-4BFD-AC93-D6882636E880", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "2FAC47DD-B613-43E4-B9BF-6120B81D9789", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "86D20CB5-60E8-405E-B387-CF80C7DA5E07", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "71AB5A01-5961-4053-9111-CF32C6473A00", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*", "matchCriteriaId": "77D8E1DC-041F-4B87-AF9A-E0EC4D6A4BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7CCCB892-30CE-4BEF-904E-5D957F94D0EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "F156798F-F2EF-4366-B17E-03165AB437D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "9EFBB9A6-DD1D-436E-919F-74A3E4F40396", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "054E34C8-B6A5-48C7-938E-D3C268E0E8BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*", "matchCriteriaId": "1DCECA72-533A-4A95-AB19-20C5F09A1B01", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*", "matchCriteriaId": "0E2309F8-AFEE-4150-99D1-BA606432ED73", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*", "matchCriteriaId": "7785F282-BFA0-400A-8398-872ACCA4BF37", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1278D3FB-78C6-4F7D-A845-0A93D4F6E2B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "C00A6EFB-A848-46D3-AAD7-FD8140007E42", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "CB6E3972-5C53-4B6D-BFE1-67E1122EA013", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "048617A0-A783-4519-A947-35220D4CD786", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "DD493A41-E686-444C-A34E-412804510F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "87D25FD6-CC3A-4AB0-B7B1-67D07386F99D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C402E9E-09CC-4EFA-AC27-156437B05B22", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C8A41F9C-D2F4-47A9-80CD-2B1BF6B0CB63", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "627FF5B9-E5A8-4DBC-A891-B175011E72A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6146EB2E-BA32-4408-B10B-A711EC39C580", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "1C863324-05AE-4FCA-BD2E-39040A468DCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A85F51E7-0AAE-4F3B-9F90-BD2E31255822", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "315FB0D4-D4A4-4369-BFB8-F2CAEB429015", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "DC74D6C5-F410-4B68-AF92-056B727193A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "B70911F8-A526-4600-8198-03FF4CCB28DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA60A9C9-C2EF-4971-BEFB-FF687DAEF2F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:-:*:*:*:*:*:*", "matchCriteriaId": "984CD6D9-4A54-4065-8401-DC555AB95425", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:patch:*:*:*:*:*:*", "matchCriteriaId": "CDE13439-4124-4BDE-A068-460BCF96419B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "BAFB22FA-CC24-4AFE-AC83-2D044563F7CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "00F3EB0D-7C63-46B5-BA95-8486B9716C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "00C1BF3B-7593-478D-9AAA-153901C70286", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "82423EC2-FA29-4AF6-86C3-6AC6DFDC4DC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "5F86406A-0936-4A06-88FB-4137A64498EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "672CE4C0-EBD6-470B-937E-810FF1C4CDBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "88DB1105-74D8-4312-9D02-D1E21F2E785C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "404C0557-6229-4D90-BFDD-54AFFCCE6A19", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:-:*:*:*:*:*:*", "matchCriteriaId": "3F4DC562-649E-4105-8B3E-43F02BD593FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6D1D26CC-891F-4396-B7D7-30D712829E71", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F25B61EA-F4D1-452A-9D96-B8DFDD719B0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9324AB96-EC99-4F04-A0A9-00F936C86EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "1B8B5E76-4A74-4E88-8A6F-C23538B7642A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "BDB6BBCA-47CE-49B8-9706-AFDE4BE46550", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "8BFF65E2-692B-4C39-88FC-6DED8D9A7258", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "5260E309-9320-4DB8-A918-7D215BF95D2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:-:*:*:*:*:*:*", "matchCriteriaId": "58F4BFC9-E02A-4121-8D34-99022AB8B45A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "60AFF340-A866-4CFE-9334-53B95FD4AA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "74E50309-CD7D-41F7-97DA-A7E451D0796A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "6FD3F8F8-820E-4C29-9F8F-023D1DB999CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "C33A6419-0D00-49D6-9A48-2B633610AAED", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "447E07C9-4A25-418D-B53F-609B78EE4C21", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E8AE686-B618-4B0D-BD27-1F96295E964D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:-:*:*:*:*:*:*", "matchCriteriaId": "9C806F87-C897-48E4-8533-A4EBC6B77078", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:patch:*:*:*:*:*:*", "matchCriteriaId": "08B8C143-93FF-44DD-8F61-6F4FEE977371", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E9751C0A-84F5-4A43-8282-12A9DE559569", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F67E2694-F6F1-482C-91F2-D9FD856EA31B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "5E2D53AA-8D50-445F-9500-2F580F260DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.1:-:*:*:*:*:*:*", "matchCriteriaId": "8859F234-5066-40DD-862C-0F3CCA98AFB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.1:patch:*:*:*:*:*:*", "matchCriteriaId": "75962F03-EC19-4920-9FA7-2D422E6E83F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12:*:*:*:*:*:*:*", "matchCriteriaId": "8D9D7D88-D64F-4F54-8C84-6AC45FBD36F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "F67AB282-591C-4ED7-9750-C593A38D5D7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:-:*:*:*:*:*:*", "matchCriteriaId": "B5D0BB0E-1BB0-4F31-9C5D-DC1A069E52DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "C9F8F881-2BF7-44AB-8756-54A06801EB11", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "36EFF3C4-4D00-4BC5-94B9-403BB00C6AB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "5E434F10-395E-426E-A988-4CDA504577D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "33FE3DCE-74B5-49A4-BC18-34B22CA83947", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "FF2E25F3-053D-4F7D-A35D-706A401CCAA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "8880AE7C-3E44-4B76-B500-E93868D4CF5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7C94269D-A271-42AC-A44C-102C814E564B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E7E5B826-D3D5-4D2D-BB4D-2C1BEDE92456", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "5BA564F7-7A69-4805-8C8C-C2EB5E12A6E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.0:-:*:*:*:*:*:*", "matchCriteriaId": "2A153336-10C4-4C42-AC66-AC1351887EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.0:patch:*:*:*:*:*:*", "matchCriteriaId": "0C2FF4E9-2513-4022-AF80-6F44A2287D6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "DF6FA464-F9D3-4674-844B-A2B2E2C42A51", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "44722C8B-BB37-4444-A58A-F01D0B3B4DDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "C4FABFDB-D99A-4F83-8FEE-3BFA36BA4061", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.1:-:*:*:*:*:*:*", "matchCriteriaId": "43E00618-19F6-4828-818A-95C9106097B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.14.1:patch:*:*:*:*:*:*", "matchCriteriaId": "CEC4F4AE-7BD8-437F-8838-FE564BCB7FA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "A842E112-8974-4E74-AD56-1DEF5B5DD9F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.15.0:-:*:*:*:*:*:*", "matchCriteriaId": "2BC3B463-6B2C-42AF-BE13-50B7D63E7F05", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.15.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D9ACBC01-8A9D-43A5-A825-1CC9670417A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "61E7199F-EACE-431A-8ADD-B96A6FCDBC49", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA7CD0E5-8E69-43B5-A5FF-8B122475CC00", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.16.0:-:*:*:*:*:*:*", "matchCriteriaId": "2799111C-06DB-4979-8F81-A8C09D53E5F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.16.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "F4BEA1B2-2103-4E25-92A9-DB107D6D4AD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.16.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "2AD9AFFB-F903-43DD-9C1D-4D8E83EA25C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "6F368897-A481-42DD-A8B0-8AD43A5FD68B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:-:*:*:*:*:*:*", "matchCriteriaId": "4F3C35F1-CBF2-4F77-AC19-574DEF2652A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:patch:*:*:*:*:*:*", "matchCriteriaId": "75EA94FD-D16A-49BC-A418-36EFC187EC7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6BA8F4AF-26C0-4A69-B489-16E7A56E5123", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FE82D53D-092D-4B36-A979-23E9A5E07A78", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.17.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "27365383-72DB-4683-9A67-CF553FF2620A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "46EE63D4-CA9C-4DF4-AF85-B8AC2E3F844A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.0:-:*:*:*:*:*:*", "matchCriteriaId": "A14FC2A1-29D5-49FE-92A9-D61833BF1C95", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "91407E03-4E98-4DD9-B584-E5BB74F09B9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "669CC22C-45E5-40AB-9A95-D7DFD694B688", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "80A38E0C-45D9-4353-8426-87A4CFA371DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:-:*:*:*:*:*:*", "matchCriteriaId": "5E3C5C1E-67E9-401A-BA52-FCB32CA4473C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "54A934AE-AB7C-4D10-8BA2-9C54410C648F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "7A7C5A8E-35E6-4B86-8502-1970031AB987", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "1FA4C14B-A01C-4CFE-8985-317ACCDAD209", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:-:*:*:*:*:*:*", "matchCriteriaId": "501F5764-BBC2-426A-AF01-7FB477850073", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:patch:*:*:*:*:*:*", "matchCriteriaId": "FDB35CE5-4EDB-4949-A5E4-1BD721CCA469", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "619704FF-2F0C-47E8-A340-58135CEE6B89", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E412E336-871A-4CAC-97E5-FB203BB9349D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.1:-:*:*:*:*:*:*", "matchCriteriaId": "82ED9CD2-504E-4D7B-B242-2511A7730776", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.1:patch:*:*:*:*:*:*", "matchCriteriaId": "EF6E50F5-605A-4D2B-B55D-8AB251532E8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.2:-:*:*:*:*:*:*", "matchCriteriaId": "F6C796AE-95EE-4EAB-959C-1C1353C565A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.20.2:patch:*:*:*:*:*:*", "matchCriteriaId": "EEAF3B2E-E520-4F43-ACC5-0F01A6247199", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.21.0:-:*:*:*:*:*:*", "matchCriteriaId": "085D4102-E2E8-496C-85B7-714FD3639BE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.21.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "FC1A0E66-63F4-4BD0-8C9A-3D23A116EE08", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.21.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "79963FF0-5ED6-41B6-8E60-146BD7879518", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.22.0:-:*:*:*:*:*:*", "matchCriteriaId": "E0ABBB2C-19EC-4D6C-A1EA-AEF0ABA4123D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.22.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0787BC7B-9464-4AAA-896B-C028ECF8E397", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.22.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "84C0FBC8-9CD1-4135-94C7-BE90A7C94625", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:-:*:*:*:*:*:*", "matchCriteriaId": "981F3994-392D-47DB-97DA-AC15BA070A36", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:patch:*:*:*:*:*:*", "matchCriteriaId": "94691EE6-266F-46CE-B388-0289EB39D91A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "FD3948A1-B5A6-4702-9187-A7720E81B7F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "BC097BB6-02E9-4F48-98CB-B5F31B41009C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C2FD962-B1D5-41E5-884E-0C3F7F9DACE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.24.0:-:*:*:*:*:*:*", "matchCriteriaId": "096E966A-878B-426F-AB40-BB476B17B969", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.24.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "852DAF2A-86F3-4D05-91DC-6A2FBC214736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.24.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "7D721486-3043-4380-A73C-44B4DD0E34C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "1F29E2EE-B6E8-4E55-84A8-3BD0658387EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.25.0:-:*:*:*:*:*:*", "matchCriteriaId": "837BF2BD-814F-4503-91DF-EE16B5A4921D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.25.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "15FCDDB3-62D8-446C-B57C-F3BBFBD13491", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.25.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "03512BDE-E441-46F6-88B7-16A2468CA199", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.26.0:-:*:*:*:*:*:*", "matchCriteriaId": "902CAF9D-9D02-47FA-AE2E-EC1268A32BA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.26.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "80AD87B5-B796-4C44-8A6D-0B22AA2903CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.26.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D87B2B3-E40B-4BF7-91E6-3B3F9CA28719", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "2575F7A4-E1F1-4836-A467-076EDD8484B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.27.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CBDFAFA3-A52F-4FC8-BA51-FE52D5F57DD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.27.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6085E437-87B8-4355-BDC0-A14EA4F52695", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "5C44D1ED-2435-4042-BF15-3D752BE0C661", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.28.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "23E4CE5C-375C-4ECB-A4D9-A5A6805E5FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "236D459B-ED50-4A2F-B463-D2F9DD1C7E8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.28.2:*:*:*:*:*:*:*", "matchCriteriaId": "E9EEB00A-68B0-4CDE-B625-AB83B1D6D2F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.32.0:*:*:*:lts:*:*:*", "matchCriteriaId": "72195459-404F-423E-A78C-DE2A728AFDA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F53B8453-F35A-49BE-8129-774BADF71BA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "CCB0C07E-DA2F-4169-848D-C3315CDC1CB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "410C43E6-5912-4C22-A592-7CF94402EEB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D50A355E-1B55-4DD2-8100-EB81AA6FC40E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "9ADF4230-EFEB-45EC-9C96-0262B4A3E459", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "5234531C-F69A-4B94-A480-147734206C5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "321C1066-6800-4488-A7C4-BE91FF738453", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9B51588-50A2-40B2-A007-06F57D38C7AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CDE2B00C-6AC0-4166-8A25-EFC42CE7F737", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "9FD404B4-2B0A-4D7A-8CF6-E2C6B4BACBB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "617FC4AF-D152-4EE1-828D-C2A6AD0DFD3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3A3FE6DC-17FD-4CEE-BDFB-9D4685640381", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8CEEB6C2-0A6D-4434-8446-CB8605CD3B14", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "1548C574-CD51-49F6-91B1-B06C504000E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "1453BB31-D674-4A05-AB2A-2502D127C3E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "868865A1-E074-4DB0-A119-D24C5C53FEF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "1794440C-7068-4673-9142-6221B8A39E5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "C5CF286B-3377-4AE9-A7B9-8535641D639A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "50EC8D9D-3483-4080-8000-496343BC8BFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "6695F632-6AC4-400F-B513-280304ABC1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "A3423C40-240A-4237-8B0F-A4B4ED421C3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:-:*:*:*:*:*:*", "matchCriteriaId": "03298D9F-CFB8-48F9-BD0C-8A0BEB0760C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "87FCBE6A-C1CD-48EF-A435-4CEADD46C917", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "42E0E639-70A2-41EE-9B34-A9223D1958AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "32E84D64-0CB8-46BF-BD3F-8CA2E0CE4C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A70420A8-8571-4528-98E1-72BE00270C6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "A276363F-F897-4E6D-9D55-5F5AA73DEE26", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "38230656-6242-4D24-AA67-F42A6FA2FC7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "20ED9FC3-5E56-4AE7-903F-267CAE7F2CA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "84F88075-9935-45BF-88B7-21ACE8AAB314", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "DB16D9D6-A2F6-4C4B-B364-1B63B1FFB5F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "283793E4-0AE8-48D9-ABCF-70E44FE55C4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "A0F79D5F-EB28-417A-86DF-053D6EDBA161", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.10.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "4A036F91-70E0-4E97-9896-EEE97BE3C20E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "C4EABFC3-24FA-4441-9F2B-650D90AE5CC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.11.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3DA61A22-3DD0-46A3-8C13-F25F4F03FD35", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "2026FD07-103C-4691-AFA4-88C490382F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.12.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "791700CD-E007-489E-9BC6-37025CAA8144", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "4061B4C7-8315-450C-866A-C4F3A6BCB1A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.13.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "C6EA7154-7F08-4E43-9270-E617632230AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.14.0:*:*:*:lts:*:*:*", "matchCriteriaId": "4149F36C-D455-415F-93D7-F92EEE41419D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.14.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "2DC51129-8F38-4505-90FB-4FFDED45BABF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.14.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "4CA571E0-B513-47AA-95BE-EB4DD2AA91E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A62DFFE-637B-4911-B3B4-6DA4053CBDBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.15.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "96C7950F-41D1-46B5-BA62-E8450CB81244", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.15.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "C9A32ECC-E208-4834-8EF7-FEF7A3495041", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "9F7C5D35-A6AE-4A2E-98C5-CB58FF22AF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.16.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "AA3E0D41-2E6E-4294-8E56-1A738A7F9AA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.17.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D16109B8-4CDF-46FC-9AD9-A158E532791B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "FD4D1A5A-99A3-4D23-B40C-BBE11EA5B325", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.18.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0F5EE428-98FF-42BC-9F61-311327B8F610", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.19.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CBA2FD08-D761-410F-9804-A76F0DD77349", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.20.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "74B34C21-D90B-4E32-BBA6-7773DB663F18", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "1D3AF185-7AC6-491E-9BE0-8ECD163A3E77", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.21.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "90996D49-5731-4F7D-9DBE-D0599A5D85A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.21.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D3C91C8D-707D-443D-985F-FA3EDB181208", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.21.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "25E7F7F5-E85A-4720-B5C9-2B776B04D904", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B446105E-6C8E-495A-BF83-A33CB33485A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:-:*:*:*:*:*:*", "matchCriteriaId": "F3DE062D-4E87-4691-A664-D9E7C02036EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3B4D6D24-A718-4962-AD4E-F19AFB03BFF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "BE2F0D0D-761C-4338-93F0-506E94E57000", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "3D38DFCA-E357-4A28-8F03-FDADF40A5185", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "B3CD4A85-26FB-4AE5-9CB7-4DF38DF32482", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F42C9442-9EBC-4CA5-AB1C-BA0662C27BDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "71762B58-A08B-405B-9596-6D15CF4A95D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "EA48C05A-E898-42EE-A699-94BBD66E5E0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "EDCB78F8-AAC8-44B1-BDF4-C73BC8951EC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D92FFF6-E7B2-4210-A652-79AC6B74002C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "DB5E92FB-9CF8-461E-A665-3407D265DF17", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "536F6C10-3165-40F7-931A-23765AB87555", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "B8DD16DF-C47C-41CF-8CDE-C365103262A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "43C06F98-62F4-4008-A463-2791BEDF6DED", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "133288EC-8A78-4C9D-BF94-9900CD3D2260", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B2E54998-B257-478E-9E52-2BB4F4CD6429", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "5FD4498A-72BD-40EB-A332-DE10C87C1015", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "71961599-009C-42F4-AA26-9B16C39F3CBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B98A2EA6-DCC6-4F8B-B132-6692AED16CF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "672EDC0E-D70A-4BB0-B7FE-5D422C737862", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.7.0:*:*:*:lts:*:*:*", "matchCriteriaId": "C779E0D4-0375-4BE8-9667-A32C68B66D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.7.0:*:*:*:standard:*:*:*", "matchCriteriaId": "6DEF3D58-73E0-402A-A15F-05CA72B5B288", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "8E9E50F8-0123-4C9E-88E1-5DCE08770B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F7C605A3-8517-4215-9AD3-980D587B22DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "866815AE-D1FE-460C-A3BC-70C251655C1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "44746060-BC6F-4E6D-BA81-61623B2D27FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "47548ADE-255A-4355-BD06-1FEF134C1620", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "ABCFC4D9-8054-4F42-BE7E-5092F6648F95", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "84A7DBB5-999C-4AE8-BC5D-F0C5F77957DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:12.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "EB1EA7C5-CE37-4A7E-AF81-636228F3BA53", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.0:*:*:*:lts:*:*:*", "matchCriteriaId": "E7D1238A-A8D2-485E-81FD-46038A883EC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FB2C4E1E-6B90-4DCC-BC09-7D19FBA65C3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "58C0FF1B-6188-4181-A139-1806328762BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "890EBB8C-989B-4344-AC03-62B399076008", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "BD4AAECB-A2BC-45BA-BC63-E51C1FE6C334", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "136D6508-660E-410D-829A-7DD452BF8819", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "AEC2B3AA-EB24-4259-BED1-5DBC102FE9C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CEA9DA4A-A3E6-4C46-9471-CCBFA71083AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "599833A2-CBE9-479B-8A6E-AF79C5EED1DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B55719B3-7325-47E1-8D16-3F34B1F44385", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B870B3B7-E8DC-45A2-8FA4-657D005D00E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "C91E9A3B-54EB-4819-94DD-30F7D0C90047", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "47189DF9-8E57-4BA6-9F52-B7A8229AE02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "905722CB-4B6C-4849-88CD-22E972432E36", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "84AAFA3C-3CCD-4615-9725-169C303CF18F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "C92E0801-9E8F-4CF2-A4A0-48BCF550F2D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.7.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "10823FD4-D618-4050-91D7-CBDE69BC570D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.28:*:*:*:*:*:*:*", "matchCriteriaId": "9365B811-5620-42F0-9400-5EA49361D2B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:*:*:*:*", "matchCriteriaId": "322694EF-B086-4BE7-A9F0-41D3A9C245FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:lts:*:*:*", "matchCriteriaId": "6AD7C9B3-D029-4E05-8E80-3ADA904FAC1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc2:*:*:*:*:*:*", "matchCriteriaId": "770CCEEA-B121-454B-BD36-3FC1B262998A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert10:*:*:lts:*:*:*", "matchCriteriaId": "BB47EA31-CF9D-4752-804B-7804151EC87C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert11:*:*:lts:*:*:*", "matchCriteriaId": "A1C9B744-1745-4E9D-A2DE-4659295508D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:*:*:*:*", "matchCriteriaId": "013B1940-C45D-4FE2-8B49-D92B8F1A9048", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:lts:*:*:*", "matchCriteriaId": "CE71221B-4D55-4643-B6D1-307B2CF41F98", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:*:*:*:*", "matchCriteriaId": "A98B11B5-B8E2-4903-B4F7-3AC23751AE8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:lts:*:*:*", "matchCriteriaId": "88124275-9BEB-4D53-9E4D-1AC8C52F2D0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert4:*:*:lts:*:*:*", "matchCriteriaId": "4F3CEFEF-72B6-4B58-81FE-01BCEEFB3013", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert5:*:*:lts:*:*:*", "matchCriteriaId": "AA637187-0EAE-4756-AD72-A0B2FABCA070", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert6:*:*:lts:*:*:*", "matchCriteriaId": "6DAF6784-0B31-4104-9D85-473D5AFAB785", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert7:*:*:lts:*:*:*", "matchCriteriaId": "77B06B83-D62C-4A0E-BE94-83C9A02CE55A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert8:*:*:lts:*:*:*", "matchCriteriaId": "CAD17809-CBB1-4E41-99C9-20FE56853563", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert9:*:*:lts:*:*:*", "matchCriteriaId": "066453F2-A77F-4E82-8C91-AC17FAA21A89", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6.0:*:*:*:lts:*:*:*", "matchCriteriaId": "D6EE9895-FB94-451D-8701-8C0DD8F5BED0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6.0:-:*:*:*:*:*:*", "matchCriteriaId": "CCDDF5C2-9B45-4811-90F6-984EF4B220CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "56849E34-B192-46A8-A517-C7C184A901B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "4610D544-156F-4E9A-BC46-9E0FF8D5D641", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "CA74CB86-72C3-4913-8EB6-3BBA1D3BC65D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1:cert1:*:*:*:*:*:*", "matchCriteriaId": "0C6CF412-290C-4524-9AFE-D58A85183864", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1:cert2:*:*:*:*:*:*", "matchCriteriaId": "BA3211EE-E305-4247-AA2E-910E48CBCDF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9F68ED1E-8D2B-4AEE-B5DE-FD50338BA82D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "EA9F296A-4932-4EA4-8B38-80856A9D6374", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "B40673A6-2980-440A-B78E-D5C7095E3FA6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Asterisk Open Source 1.8.x, 11.x before 11.21.1, 12.x, and 13.x before 13.7.1 and Certified Asterisk 1.8.28, 11.6 before 11.6-cert12, and 13.1 before 13.1-cert3 allow remote authenticated users to cause a denial of service (uninitialized pointer dereference and crash) via a zero length error correcting redundancy packet for a UDPTL FAX packet that is lost." }, { "lang": "es", "value": "Asterisk Open Source 1.8.x, 11.x en versiones anteriores a 11.21.1, 12.x y 13.x en versiones anteriores a 13.7.1 y Certified Asterisk 1.8.28, 11.6 en versiones anteriores a 11.6-cert12 y 13.1 en versiones anteriores a 13.1-cert3 permiten a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (referencia a puntero no inicializado y ca\u00edda) a trav\u00e9s de un error de longitud cero corrigiendo la redundancia de paquetes para un paquete UDPTL FAX que se ha perdido." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/476.html\"\u003eCWE-476: NULL Pointer Dereference\u003c/a\u003e", "id": "CVE-2016-2232", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-02-22T15:59:01.190", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2016-003.html" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2016/dsa-3700" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1034931" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2016-003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2016/dsa-3700" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1034931" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-22 17:15
Modified
2024-11-21 04:33
Severity ?
Summary
An issue was discovered in channels/chan_sip.c in Sangoma Asterisk 13.x before 13.29.2, 16.x before 16.6.2, and 17.x before 17.0.1, and Certified Asterisk 13.21 before cert5. A SIP request can be sent to Asterisk that can change a SIP peer's IP address. A REGISTER does not need to occur, and calls can be hijacked as a result. The only thing that needs to be known is the peer's name; authentication details such as passwords do not need to be known. This vulnerability is only exploitable when the nat option is set to the default, or auto_force_rport.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://downloads.asterisk.org/pub/security/AST-2019-006.html | Patch, Vendor Advisory | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2019/11/msg00038.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2022/04/msg00001.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://www.asterisk.org/downloads/security-advisories | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://downloads.asterisk.org/pub/security/AST-2019-006.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2019/11/msg00038.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2022/04/msg00001.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.asterisk.org/downloads/security-advisories | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digium | asterisk | * | |
digium | asterisk | * | |
digium | asterisk | * | |
digium | certified_asterisk | 13.21.0 | |
digium | certified_asterisk | 13.21.0 | |
digium | certified_asterisk | 13.21.0 | |
digium | certified_asterisk | 13.21.0 | |
digium | certified_asterisk | 13.21.0 | |
digium | certified_asterisk | 13.21.0 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "3000F83F-4D47-4BA8-BF35-844C41BFBE18", "versionEndExcluding": "13.29.2", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "65C549ED-B864-47C9-ACD8-C695FC7DAE57", "versionEndExcluding": "16.6.2", "versionStartIncluding": "16.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "43F12809-5F7E-4B99-A028-30B43BAFB5A6", "versionEndExcluding": "17.0.1", "versionStartIncluding": "17.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "9FC7665A-FF2F-4A20-B695-96C2217D268E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.21.0:cert1:*:*:*:*:*:*", "matchCriteriaId": "18C39C0A-7F81-4734-8C1D-4FFDF070F526", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.21.0:cert2:*:*:*:*:*:*", "matchCriteriaId": "F809DB3A-457F-4DEF-9B11-E3FCDF2D8466", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.21.0:cert3:*:*:*:*:*:*", "matchCriteriaId": "1F170494-F60A-42C2-A2CE-1BB5BDCC8200", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.21.0:cert4:*:*:*:*:*:*", "matchCriteriaId": "2A28B713-6CBB-4F4D-A54B-17758DD35EE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.21.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B7D110F5-E431-4F31-8723-494D20D9108D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in channels/chan_sip.c in Sangoma Asterisk 13.x before 13.29.2, 16.x before 16.6.2, and 17.x before 17.0.1, and Certified Asterisk 13.21 before cert5. A SIP request can be sent to Asterisk that can change a SIP peer\u0027s IP address. A REGISTER does not need to occur, and calls can be hijacked as a result. The only thing that needs to be known is the peer\u0027s name; authentication details such as passwords do not need to be known. This vulnerability is only exploitable when the nat option is set to the default, or auto_force_rport." }, { "lang": "es", "value": "Se ha descubierto un problema en channels/chan_sip.c en Sangoma Asterisk 13.x antes de 13.29.2, 16.x antes de 16.6.2, y 17.x antes de 17.0.1, y Certified Asterisk 13.21 antes de cert5. Una solicitud SIP puede ser enviada a Asterisk que puede cambiar la direcci\u00f3n IP de un peer SIP. Un REGISTRO no necesita ocurrir, y las llamadas pueden ser secuestradas como resultado. Lo \u00fanico que se necesita conocer es el nombre del peer; los detalles de autenticaci\u00f3n como las contrase\u00f1as no necesitan ser conocidos. Esta vulnerabilidad s\u00f3lo es explotable cuando la opci\u00f3n nat est\u00e1 configurada por defecto, o auto_force_rport" } ], "id": "CVE-2019-18790", "lastModified": "2024-11-21T04:33:34.090", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-22T17:15:11.740", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2019-006.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00038.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.asterisk.org/downloads/security-advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2019-006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00038.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.asterisk.org/downloads/security-advisories" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-07-06 19:55
Modified
2025-04-11 00:51
Severity ?
Summary
The default configuration of the SIP channel driver in Asterisk Open Source 1.4.x through 1.4.41.2 and 1.6.2.x through 1.6.2.18.2 does not enable the alwaysauthreject option, which allows remote attackers to enumerate account names by making a series of invalid SIP requests and observing the differences in the responses for different usernames, a different vulnerability than CVE-2011-2536.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1F8B700A-FACB-4BC8-9DF2-972DC63D852B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FFD31B9B-2F43-4637-BE56-47A807384BF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "E6450D6B-C907-49E6-9788-E4029C09285F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "DDB0432E-024A-4C0C-87FF-448E513D2834", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "D6A6A343-FEA2-49E5-9858-455AE3B29470", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc6:*:*:*:*:*:*", "matchCriteriaId": "D57B94E3-EA37-466C-ADC4-5180D4502FDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc7:*:*:*:*:*:*", "matchCriteriaId": "64D35A89-6B21-4770-AA0F-424C5C91A254", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc8:*:*:*:*:*:*", "matchCriteriaId": "14817302-A34A-4980-B148-AEB4B3B49BE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "61FDFA96-E62A-413B-9846-F51F1F7349EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "DA924386-49F6-4371-B975-B1473EEA12F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "B74A1B99-8901-4690-B994-1DAD3EFA5ABB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "4253C7DD-3588-4B35-B96D-C027133BE93F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "24AE11DB-16D3-42BF-BC64-E8982107D35B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "53841D77-926C-4362-BC85-BD8B6AC4391D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "F98FD6E6-EDE9-437D-B7C2-2DB65B73D230", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "4BA6CA77-D358-4623-8400-78EFC47ADB7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "B4E62DAB-45E0-4EAA-8E45-6D3757A679D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.15:rc1:*:*:*:*:*:*", "matchCriteriaId": "1355578C-B384-401A-9123-2789CBECAD0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "3491F8DB-A162-4608-B5F9-5401FE058CEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16:rc1:*:*:*:*:*:*", "matchCriteriaId": "C52730A8-D96E-46C1-8905-1D78A93E9C84", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "C6E5CD17-B14A-4BDB-BA75-261344FF6F25", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "63C8DBF5-6992-4618-BD2D-56F1F98EAE3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "EEED6C07-CFB7-44DC-9A41-9B6271942123", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:rc1:*:*:*:*:*:*", "matchCriteriaId": "0864DAF9-B7FA-4018-99F4-F2A7AA6FBBB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:rc2:*:*:*:*:*:*", "matchCriteriaId": "694B257B-E73B-4534-B316-87284FA45534", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:rc3:*:*:*:*:*:*", "matchCriteriaId": "418FD91F-014E-4529-8D72-D3FB27788EEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "D213EC93-0D4F-4BD9-9F13-9A9E705135EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17.2:*:*:*:*:*:*:*", "matchCriteriaId": "2E9D2091-B292-4D6E-A91F-58D24BD5A5E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17.3:*:*:*:*:*:*:*", "matchCriteriaId": "CFF196A0-87E1-4DD2-8CDA-B19EB6F71312", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "6F59B7C5-8EF3-495E-9A91-9C96E6DF41E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.18:rc1:*:*:*:*:*:*", "matchCriteriaId": "D9020FF4-645B-4E98-8CB0-3F8DF7C5841B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "9FA6B65B-1D93-4028-BD85-8879D310B896", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.18.2:*:*:*:*:*:*:*", "matchCriteriaId": "79A46D43-FE29-4665-8052-284BC9C70D9E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E56DB29-571D-4615-B347-38CF4590E463", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "FC1188DA-6C27-48D2-9CE7-74D77B24EE9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "A93B8F91-5C56-44DE-AE29-8468E853759F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "BF7F4D02-7C8E-403C-A53E-A5F8C07F33A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "D85031A3-3444-4650-905D-721F1EBAA24F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "6F0AC2B3-6E8A-4B26-8A6C-792D9E5072C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "2BC8D6D4-A389-4A78-8DA8-351A9CB896E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "5E979AC4-58EA-4297-9F90-350924BBE440", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "3A58CCD3-4A0C-468B-85F2-59A52B7293A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "3542DB91-8487-49D6-AA15-E8FD9D6B99D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "6BA4F3F1-C3F1-4E15-A854-9BB84E33E4AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "661D710E-79F0-4E98-B35B-ED0549D35C24", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "68291ADE-F9D1-427B-B150-FDA7F2F4788B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F80CBCB-F58D-4BE7-8E78-67E04C900D01", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "EB61D32E-3400-480E-BD27-BA3F98F94427", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "D9154EDB-CAE6-4BB0-8D02-9EC2B81D93C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "A432B0A7-F158-4B9C-97F6-6A29DB13EAFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "687C67CB-46AF-40C2-8A02-081C7F78568A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "6E8D6EC0-A61E-4DBC-A0C7-864E9C4BDA1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EF7F65A-45FD-4586-901E-49B057100BB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "300F158E-ED27-46C8-85E4-AA0AA6B201DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "FB6F04C0-3226-4D2C-97A3-39999483C62C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "30685A20-963A-48D4-B7D7-2C11C2C812AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "C54C3AAC-4D5D-4661-86AB-6849982E8C67", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "6F847916-89F1-4AA6-973D-6002C8B54EE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "5359815E-671A-4DFD-9E99-8CF903A03C84", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "E2EFBC9E-4DCA-43CB-93EB-6807E2383A98", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.18:*:*:*:*:*:*:*", "matchCriteriaId": "98755B1B-CAD5-4AC5-8571-52E67C3A8274", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:*:*:*:*:*:*:*", "matchCriteriaId": "C9D8C8FE-3D09-4F60-AD03-9D4439942141", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc1:*:*:*:*:*:*", "matchCriteriaId": "902FBE4B-5237-43CD-8EB6-D2CAC0F30879", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc2:*:*:*:*:*:*", "matchCriteriaId": "708DCACA-49EC-468D-81EC-CE5367F8A164", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc3:*:*:*:*:*:*", "matchCriteriaId": "BA9E3314-7D23-414C-8187-16D807410B62", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc4:*:*:*:*:*:*", "matchCriteriaId": "D824ED7B-BAB6-4C0F-A6B0-A75AB072EC0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A01CE63-F834-48B2-826D-2DAD1B4AE8C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "88B9CC9D-3DC2-4674-BA52-4C6D4E2056C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:*:*:*:*:*:*:*", "matchCriteriaId": "43F1849F-1230-45E7-B6A3-D6FC72EB0F11", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc1:*:*:*:*:*:*", "matchCriteriaId": "873C9C7E-93A3-4269-B19C-AB33A21C1AC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc2:*:*:*:*:*:*", "matchCriteriaId": "457F2112-7C5E-4953-8F4C-117925D486DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc3:*:*:*:*:*:*", "matchCriteriaId": "BD15ADD6-D7FA-441A-A9BC-487BCC15F2A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "792A8901-B7B8-40E8-9258-6338B72770FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:*:*:*:*:*:*:*", "matchCriteriaId": "0E6C8F78-0C00-45A5-8FEB-2A4BD5AC1A37", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:rc1:*:*:*:*:*:*", "matchCriteriaId": "F3E04247-C4EF-4C1B-B879-5C02986950D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:rc2:*:*:*:*:*:*", "matchCriteriaId": "5E382FC8-4001-4058-9151-05AE98B4A35E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "11FECE6B-B6A6-4DDA-9019-9A10B05EC1F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "D9813D27-0688-4989-99EB-1DC0F82D59F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:*:*:*:*:*:*:*", "matchCriteriaId": "D4333904-9D21-4149-965F-F49F0A34BD85", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc1:*:*:*:*:*:*", "matchCriteriaId": "F7180626-F0FD-46F3-AD52-5C67525C4B46", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc2:*:*:*:*:*:*", "matchCriteriaId": "85A1E3A3-C157-4F3D-9477-F63771E7F627", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc3:*:*:*:*:*:*", "matchCriteriaId": "FEE739CC-7A9C-489E-BFC0-6257129C043D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc4:*:*:*:*:*:*", "matchCriteriaId": "ADC0E947-A95A-44ED-8DED-CC769FF00569", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc5:*:*:*:*:*:*", "matchCriteriaId": "DE52BD9F-3728-455C-BC45-1A4DB926FFE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22.1:*:*:*:*:*:*:*", "matchCriteriaId": "1EF82D41-9222-42D3-ADAD-94B4F950C63F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.22.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AE9F181-A8E4-4700-A30F-211CDE251606", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:*:*:*:*:*:*:*", "matchCriteriaId": "5B10AE4B-EC2D-4D5B-B842-50F5097A0650", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc1:*:*:*:*:*:*", "matchCriteriaId": "83E854D0-17A2-473B-B7E8-41E6447C81DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc2:*:*:*:*:*:*", "matchCriteriaId": "47169133-3854-4D8F-B79E-3CC77A166EF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc3:*:*:*:*:*:*", "matchCriteriaId": "6071601F-CF37-4E66-9D6D-AFC3434C18AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc4:*:*:*:*:*:*", "matchCriteriaId": "2A575824-E005-4820-824A-4875594619E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "080C7089-5662-4A94-9842-C4A26095DA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.23.2:*:*:*:*:*:*:*", "matchCriteriaId": "7AE38697-0B16-4032-9234-CA263E4A9885", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.24:*:*:*:*:*:*:*", "matchCriteriaId": "DCB18BE2-B073-429C-ABE7-B8305793DAE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.24:rc1:*:*:*:*:*:*", "matchCriteriaId": "FA7216BA-A42F-4ED8-8086-B4FA483FDAB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "CB7D2048-CD61-46C0-830B-11976B275783", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.25:*:*:*:*:*:*:*", "matchCriteriaId": "8DBA63FE-62AF-4F3D-B30C-550D17C4E35F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.25:rc1:*:*:*:*:*:*", "matchCriteriaId": "AD0A0F19-020D-4578-9023-12B0CB646D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.25.1:*:*:*:*:*:*:*", "matchCriteriaId": "96D5A1E3-FF0B-4C71-AA51-655D7106880D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:*:*:*:*:*:*:*", "matchCriteriaId": "E5D425E6-E2E5-4452-9EAA-2697C1155784", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc1:*:*:*:*:*:*", "matchCriteriaId": "9855FA26-0930-4AC9-A920-B394F6916349", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc2:*:*:*:*:*:*", "matchCriteriaId": "BBA21246-7DF4-41BC-998A-05D38FC97C8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc3:*:*:*:*:*:*", "matchCriteriaId": "EE9A7984-22C9-4296-8E44-C010E67F193D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc4:*:*:*:*:*:*", "matchCriteriaId": "51B2C42A-C252-4BD8-A908-8F30C2BF15E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc5:*:*:*:*:*:*", "matchCriteriaId": "2137CEAD-0F19-43C5-A26D-1972564FCD8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc6:*:*:*:*:*:*", "matchCriteriaId": "B7552466-B782-4F16-8561-A2A51E94FED4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26.1:*:*:*:*:*:*:*", "matchCriteriaId": "C2F8C82D-3031-4C62-89FA-3BF56EA29727", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26.2:*:*:*:*:*:*:*", "matchCriteriaId": "B3074CEA-46BD-4CAD-BF5C-10008A80E434", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.26.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6AB8988-FCC6-407A-A7D9-2F7A3A7488B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:*:*:*:*:*:*:*", "matchCriteriaId": "E06848DE-6EE1-4FD0-A14F-39D41B2F3E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc1:*:*:*:*:*:*", "matchCriteriaId": "CF342950-FDD7-41A9-94D5-EDF41130B61E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc2:*:*:*:*:*:*", "matchCriteriaId": "6E4543AA-3D54-4444-AD1F-381A87A89DA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc3:*:*:*:*:*:*", "matchCriteriaId": "AF3036DD-261C-4975-A01E-92CD29479588", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc4:*:*:*:*:*:*", "matchCriteriaId": "EF07C116-27DC-4875-9DCF-049E2A8EAEA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc5:*:*:*:*:*:*", "matchCriteriaId": "88FBC328-538A-4484-A342-1688D9669B9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.27.1:*:*:*:*:*:*:*", "matchCriteriaId": "CBF2301E-F6EF-4D28-82EE-FA1AB8CA9E43", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.28:*:*:*:*:*:*:*", "matchCriteriaId": "A53F637C-846A-43FC-BA71-C8571648FA46", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.28:rc1:*:*:*:*:*:*", "matchCriteriaId": "E61070F4-1B6B-4814-918E-459DE5119A24", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.29:*:*:*:*:*:*:*", "matchCriteriaId": "70664E0F-09CF-42C2-A7A7-E635D022E90D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.29:rc1:*:*:*:*:*:*", "matchCriteriaId": "D1E13E1A-C2D4-4E5A-84C8-E6AF061D67C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.29.1:*:*:*:*:*:*:*", "matchCriteriaId": "7E811134-B657-4C50-9AEF-A7F68CA5577A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.30:*:*:*:*:*:*:*", "matchCriteriaId": "4C4CD101-F079-4940-AA79-886B69A7A514", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.30:rc2:*:*:*:*:*:*", "matchCriteriaId": "B7B828E9-5BE3-4E6F-8048-F2B1F2E929CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.30:rc3:*:*:*:*:*:*", "matchCriteriaId": "75BB2066-74A6-4F89-B54C-35F234DC1F03", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.31:*:*:*:*:*:*:*", "matchCriteriaId": "FE522334-BF53-4E34-949B-CD928B59A341", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.31:rc1:*:*:*:*:*:*", "matchCriteriaId": "648DEC0E-3CBC-4EA2-AF27-2C518B0762CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.31:rc2:*:*:*:*:*:*", "matchCriteriaId": "B50F4BAE-D00D-4352-B52B-BE1A9FFB6949", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.32:*:*:*:*:*:*:*", "matchCriteriaId": "E7A35508-8235-4915-8810-12B2630C82C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.32:rc1:*:*:*:*:*:*", "matchCriteriaId": "63DD4EE5-6F56-41C7-9CB4-16ADF4F63B8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.33:*:*:*:*:*:*:*", "matchCriteriaId": "2347E451-2F89-4EA6-A6E0-22BCB0C8A56E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.33:rc1:*:*:*:*:*:*", "matchCriteriaId": "A86F5360-6FE4-4EA2-9208-076E78C842A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.33:rc2:*:*:*:*:*:*", "matchCriteriaId": "3CDFA85B-17A4-4ECC-9922-F5546917B4C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.33.1:*:*:*:*:*:*:*", "matchCriteriaId": "3D7D7DB7-32A7-490E-AED2-C404D371E7C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.34:*:*:*:*:*:*:*", "matchCriteriaId": "A03632BC-CA0F-42BD-8839-A72DB146A4A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.34:rc1:*:*:*:*:*:*", "matchCriteriaId": "9DC4EF64-6A1D-47CB-AC07-48CABB612DCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.34:rc2:*:*:*:*:*:*", "matchCriteriaId": "68C00FEF-7850-48F4-8122-4211D080B508", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.35:*:*:*:*:*:*:*", "matchCriteriaId": "D3A48F07-42E1-47E9-94EA-44D20A0BAC3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.35:rc1:*:*:*:*:*:*", "matchCriteriaId": "87D16470-5892-4289-BB35-B69100BCA31E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.36:*:*:*:*:*:*:*", "matchCriteriaId": "15E71BD7-83D1-4E2B-AD40-BB6B53056C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.36:rc1:*:*:*:*:*:*", "matchCriteriaId": "87FDE2E2-5F08-43EF-BBD8-7DCCC0C98870", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.37:*:*:*:*:*:*:*", "matchCriteriaId": "347E9D8C-A372-41F2-AB48-FFCAB454C9C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.37:rc1:*:*:*:*:*:*", "matchCriteriaId": "74F67E57-1DD0-4850-8D7E-7A9748BD106C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.38:*:*:*:*:*:*:*", "matchCriteriaId": "B208C056-B567-4BEE-A9B7-AEB394341D5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.38:rc1:*:*:*:*:*:*", "matchCriteriaId": "A0C3A2D4-07A9-4D28-AC18-03523E9FF34A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.39:*:*:*:*:*:*:*", "matchCriteriaId": "E6516E0F-9F60-4D20-88D3-B9CD8DC93062", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.39:rc1:*:*:*:*:*:*", "matchCriteriaId": "22147B91-45A4-4834-AC8D-2DC17A706BEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.39.1:*:*:*:*:*:*:*", "matchCriteriaId": "677C10DE-46D8-4EF1-BF22-63F3AE37CBC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.39.2:*:*:*:*:*:*:*", "matchCriteriaId": "E299CE20-B02D-4519-AC46-BB64B1E3826A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.40:*:*:*:*:*:*:*", "matchCriteriaId": "22FD16C3-7518-4208-8C0A-043C13C14A72", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.40:rc1:*:*:*:*:*:*", "matchCriteriaId": "2461B6B9-2C93-4D84-A1EE-C07AD32A9540", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.40:rc2:*:*:*:*:*:*", "matchCriteriaId": "C8A4CE2D-FBAB-4C35-846A-5B95BBCAD6BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.40:rc3:*:*:*:*:*:*", "matchCriteriaId": "30FFB6F4-1BC7-4D4C-9C65-A66CF514E321", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.40.1:*:*:*:*:*:*:*", "matchCriteriaId": "F745AF0A-D6A6-4429-BBBE-347BF41999BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.40.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC44F61B-AB96-4643-899B-19B9E3B4F05C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.41:*:*:*:*:*:*:*", "matchCriteriaId": "F788A255-CF21-424F-9F30-8A744CC16740", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.41:rc1:*:*:*:*:*:*", "matchCriteriaId": "92B8AA8E-D49B-4AD7-8AFC-BD4F9E9C7A16", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.41.1:*:*:*:*:*:*:*", "matchCriteriaId": "0606F179-8817-4124-B92B-CD868B216320", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.4.41.2:*:*:*:*:*:*:*", "matchCriteriaId": "E93609A6-7FFD-4179-86E9-0D1292B035B8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The default configuration of the SIP channel driver in Asterisk Open Source 1.4.x through 1.4.41.2 and 1.6.2.x through 1.6.2.18.2 does not enable the alwaysauthreject option, which allows remote attackers to enumerate account names by making a series of invalid SIP requests and observing the differences in the responses for different usernames, a different vulnerability than CVE-2011-2536." }, { "lang": "es", "value": "La configuraci\u00f3n por defecto del controlador del canal SIP en Asterisk Open Source 1.4.x hasta 1.1.41.2 y 1.6.2.x hasta 1.6.2.18.2 no activa la opci\u00f3n alwaysauthreject, lo que permite a atacantes remotos enumerar los nombres de las cuentas al hacer una serie de peticiones SIP inv\u00e1lidas y observando las diferencias en las respuestas para distintos nombres de usuario, es una vulnerabilidad distinta a CVE-2011-2536." } ], "id": "CVE-2011-2666", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-07-06T19:55:03.637", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2011-011.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68472" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2011-011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68472" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-16" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-04-15 05:15
Modified
2024-11-21 06:54
Severity ?
Summary
An issue was discovered in Asterisk through 19.x. When using STIR/SHAKEN, it is possible to download files that are not certificates. These files could be much larger than what one would expect to download, leading to Resource Exhaustion. This is fixed in 16.25.2, 18.11.2, and 19.3.2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digium | asterisk | * | |
digium | asterisk | * | |
digium | asterisk | * | |
debian | debian_linux | 10.0 | |
debian | debian_linux | 11.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8AB56FA-AEC6-4A6F-B420-DDBF3390379B", "versionEndIncluding": "16.25.1", "versionStartIncluding": "16.15.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "496A20DA-23D7-435B-8EA9-3AC585DAAB72", "versionEndExcluding": "18.11.2", "versionStartIncluding": "18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", "matchCriteriaId": "C25BFFCA-90FE-475D-88A7-3BC281B830AF", "versionEndIncluding": "19.3.1", "versionStartIncluding": "19.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Asterisk through 19.x. When using STIR/SHAKEN, it is possible to download files that are not certificates. These files could be much larger than what one would expect to download, leading to Resource Exhaustion. This is fixed in 16.25.2, 18.11.2, and 19.3.2." }, { "lang": "es", "value": "Se ha detectado un problema en Asterisk versiones hasta 19.x. Cuando es usado STIR/SHAKEN, es posible descargar archivos que no son certificados. Estos archivos pod\u00edan ser mucho m\u00e1s grandes de lo que se esperaba descargar, conllevando a un agotamiento de recursos. Esto ha sido corregido en versiones 16.25.2, 18.11.2 y 19.3.2" } ], "id": "CVE-2022-26498", "lastModified": "2024-11-21T06:54:03.827", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-15T05:15:06.597", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/166744/Asterisk-Project-Security-Advisory-AST-2022-001.html" }, { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/172139/Shannon-Baseband-chatroom-SDP-Attribute-Memory-Corruption.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/AST-2022-001.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/166744/Asterisk-Project-Security-Advisory-AST-2022-001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/172139/Shannon-Baseband-chatroom-SDP-Attribute-Memory-Corruption.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://downloads.asterisk.org/pub/security/AST-2022-001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5285" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-04-17 16:59
Modified
2025-04-20 01:37
Severity ?
Summary
chain_sip in Asterisk Open Source 11.x before 11.23.1 and 13.x 13.11.1 and Certified Asterisk 11.6 before 11.6-cert15 and 13.8 before 13.8-cert3 allows remote attackers to cause a denial of service (port exhaustion).
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F53B8453-F35A-49BE-8129-774BADF71BA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "CCB0C07E-DA2F-4169-848D-C3315CDC1CB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "410C43E6-5912-4C22-A592-7CF94402EEB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D50A355E-1B55-4DD2-8100-EB81AA6FC40E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "9ADF4230-EFEB-45EC-9C96-0262B4A3E459", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "5234531C-F69A-4B94-A480-147734206C5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "321C1066-6800-4488-A7C4-BE91FF738453", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9B51588-50A2-40B2-A007-06F57D38C7AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CDE2B00C-6AC0-4166-8A25-EFC42CE7F737", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "617FC4AF-D152-4EE1-828D-C2A6AD0DFD3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3A3FE6DC-17FD-4CEE-BDFB-9D4685640381", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8CEEB6C2-0A6D-4434-8446-CB8605CD3B14", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F31715AF-5A35-4D0B-8E01-BB6E4CB7E02F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "1548C574-CD51-49F6-91B1-B06C504000E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D56C2C11-4B42-43AB-9DAE-61C15D107160", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "7BE4127D-8123-4408-86D3-08168A4501B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8836F348-66DF-43BC-9962-946018D13127", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "12745DB9-F19D-4507-A9FE-218B7BB29DB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "C689A32B-E87D-492F-B3F6-7B80DFA049C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "229B7982-9775-42AA-B8F5-FE920CCAA497", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "8788AF7B-CBB6-4D9D-A748-486787935A96", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "868865A1-E074-4DB0-A119-D24C5C53FEF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "7B3D89C7-909F-419A-9EE8-A1F0D02934EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "50EC8D9D-3483-4080-8000-496343BC8BFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "24F62C78-2913-463F-B689-353AB2371E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A70420A8-8571-4528-98E1-72BE00270C6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "A276363F-F897-4E6D-9D55-5F5AA73DEE26", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "DB16D9D6-A2F6-4C4B-B364-1B63B1FFB5F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "A0F79D5F-EB28-417A-86DF-053D6EDBA161", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "C92ECBCD-1EE3-498A-B3A4-22BF8EFD2EE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "C4EABFC3-24FA-4441-9F2B-650D90AE5CC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "2026FD07-103C-4691-AFA4-88C490382F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "65607103-4284-430A-8212-AC1DCFFFA778", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "4061B4C7-8315-450C-866A-C4F3A6BCB1A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "00099DC9-D437-429B-9D08-F0DFA4942A6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "EC6047FB-D1BD-4E21-B6BC-E51374C4B0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "89504BDC-82F7-4813-9C1E-456C9ACC6FB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "118C550E-79A8-431E-BADB-710EEEEDC6C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A62DFFE-637B-4911-B3B4-6DA4053CBDBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "5DF6BC60-23F5-46A1-83F8-F4BCDEF196EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "9F7C5D35-A6AE-4A2E-98C5-CB58FF22AF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "D23CE302-AC62-468C-96B3-1EF430825170", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "9DCAA174-3CA3-49DB-BA19-D2BCF4F8953F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "FD4D1A5A-99A3-4D23-B40C-BBE11EA5B325", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "5EFFAE3F-3B78-49DE-8F01-2E439D9A6F7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "0501E88B-986A-44C6-A6B5-F2CB9087A8B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "1D3AF185-7AC6-491E-9BE0-8ECD163A3E77", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "400EA2E1-B178-467F-BBC2-1B2ECEDE662A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E00A6C7-D3CF-40B5-A586-06E09C5AA1A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E25D043-EE0D-49A5-A468-03EDD9CFE0EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.22.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CA17630B-444D-4AE4-B582-F8106C4EEFDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "62A20D6B-62FE-440D-BC58-F764AAA5562B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:11.23.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "F2AE880B-2FA2-42BB-BEBF-771E18FDA141", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "7B635C21-C193-43AF-A139-98604F324ABF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "E93A7967-9A04-424A-BDDB-A2B8289B9AC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "8F75C9FF-6F95-4F6A-B683-FE2BEDE3AD10", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "68226156-42ED-4F0E-93E1-02DD57E582B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FB2C4E1E-6B90-4DCC-BC09-7D19FBA65C3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A4EB385E-28B5-4259-9431-99E1F32D61B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "58C0FF1B-6188-4181-A139-1806328762BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "121EACD3-D5E3-4691-8024-95996865BB65", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "136D6508-660E-410D-829A-7DD452BF8819", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "74B23D17-7356-4D37-8C73-E87896D1335B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5BA542E-4667-4D9E-BDAE-FED6CA63F99D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83C8E7EC-0D4C-40E2-9EE1-4AB5F03464D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "81A8A6CB-D236-4AB3-8476-C2D34DB7EF31", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "599833A2-CBE9-479B-8A6E-AF79C5EED1DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B870B3B7-E8DC-45A2-8FA4-657D005D00E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "707296C4-153C-4ACF-B91A-AB5FA42260CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "905722CB-4B6C-4849-88CD-22E972432E36", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "5C1C39FA-EF1A-4F2B-87A0-A00BAE73C6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "677D1211-0B07-47B9-AB7A-E820E2B29561", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "84202BAF-29E1-472B-B11F-B73F6A8891CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "FFC7120D-E6A0-4801-A1CC-3E143896EE72", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "BAF2A83D-D9AE-441D-8D4E-335BF9D28A63", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "7F5C1479-A540-4B7D-B00C-BD35EEC83BB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "AC12556C-5E82-47D7-87E5-FBDC01A920DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "461C1D2D-C4C1-4FF8-8231-38A2505F3523", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "66595711-8573-4A9B-A8FE-4943E3097AA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "5D1FE3D4-A0B9-475A-9B89-B0222283A6A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:13.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "9670B5AC-CBD1-484C-90F8-69B1A60B6054", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:*:*:*:*", "matchCriteriaId": "322694EF-B086-4BE7-A9F0-41D3A9C245FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:lts:*:*:*", "matchCriteriaId": "6AD7C9B3-D029-4E05-8E80-3ADA904FAC1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc1:*:*:*:*:*:*", "matchCriteriaId": "781AC882-80DD-4176-8E4F-220343B15F68", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc2:*:*:*:*:*:*", "matchCriteriaId": "770CCEEA-B121-454B-BD36-3FC1B262998A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert10:*:*:lts:*:*:*", "matchCriteriaId": "BB47EA31-CF9D-4752-804B-7804151EC87C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert11:*:*:lts:*:*:*", "matchCriteriaId": "A1C9B744-1745-4E9D-A2DE-4659295508D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert12:*:*:lts:*:*:*", "matchCriteriaId": "BFFD88AD-C82E-4C5C-9C4F-8A49176E3E52", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert13:*:*:lts:*:*:*", "matchCriteriaId": "6797C78B-BB9A-46B4-8F0B-492FB1988BB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert14:*:*:lts:*:*:*", "matchCriteriaId": "10A38D53-6C8E-493E-8207-F4CF7D754A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert15:*:*:lts:*:*:*", "matchCriteriaId": "4CC0C753-9179-4C71-AFD8-C4601D8C865A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:*:*:*:*", "matchCriteriaId": "013B1940-C45D-4FE2-8B49-D92B8F1A9048", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:lts:*:*:*", "matchCriteriaId": "CE71221B-4D55-4643-B6D1-307B2CF41F98", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:*:*:*:*", "matchCriteriaId": "A98B11B5-B8E2-4903-B4F7-3AC23751AE8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:lts:*:*:*", "matchCriteriaId": "88124275-9BEB-4D53-9E4D-1AC8C52F2D0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert4:*:*:lts:*:*:*", "matchCriteriaId": "4F3CEFEF-72B6-4B58-81FE-01BCEEFB3013", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert5:*:*:lts:*:*:*", "matchCriteriaId": "AA637187-0EAE-4756-AD72-A0B2FABCA070", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert6:*:*:lts:*:*:*", "matchCriteriaId": "6DAF6784-0B31-4104-9D85-473D5AFAB785", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert7:*:*:lts:*:*:*", "matchCriteriaId": "77B06B83-D62C-4A0E-BE94-83C9A02CE55A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert8:*:*:lts:*:*:*", "matchCriteriaId": "CAD17809-CBB1-4E41-99C9-20FE56853563", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert9:*:*:lts:*:*:*", "matchCriteriaId": "066453F2-A77F-4E82-8C91-AC17FAA21A89", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6.0:*:*:*:lts:*:*:*", "matchCriteriaId": "D6EE9895-FB94-451D-8701-8C0DD8F5BED0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6.0:-:*:*:*:*:*:*", "matchCriteriaId": "CCDDF5C2-9B45-4811-90F6-984EF4B220CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "56849E34-B192-46A8-A517-C7C184A901B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "4610D544-156F-4E9A-BC46-9E0FF8D5D641", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.8:cert1:*:*:*:*:*:*", "matchCriteriaId": "38E19C8E-9FD6-4A44-81C6-EEC91BC2CB58", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.8:cert1_rc1:*:*:*:*:*:*", "matchCriteriaId": "2016E8F9-542D-46CE-905D-3CBAF97A24A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.8:cert1_rc2:*:*:*:*:*:*", "matchCriteriaId": "CC283754-B316-4BCE-8EEB-63CAFE68D601", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.8:cert1_rc3:*:*:*:*:*:*", "matchCriteriaId": "9D111448-7C39-4A6D-B492-B3D3DCEA8424", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.8:cert2_rc1:*:*:*:*:*:*", "matchCriteriaId": "A52E12AB-99CA-4A34-A0CA-E8B511636A5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "BDB08CB2-8FB4-4738-9B67-C27273A78025", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:certified_asterisk:13.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "1E36EFEF-670E-4659-A887-D497D4AA8223", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "chain_sip in Asterisk Open Source 11.x before 11.23.1 and 13.x 13.11.1 and Certified Asterisk 11.6 before 11.6-cert15 and 13.8 before 13.8-cert3 allows remote attackers to cause a denial of service (port exhaustion)." }, { "lang": "es", "value": "chain_sip en Asterisk Open Source 11.x en versiones anteriores a 11.23.1 y 13.x 13.11.1 y Certified Asterisk 11.6 en versiones anteriores a 11.6-cert15 y 13.8 en versiones anteriores a 13.8-cert3 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (agotamiento portuario)" } ], "id": "CVE-2016-7551", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-17T16:59:00.277", "references": [ { "source": "cve@mitre.org", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2016-007.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3700" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838832" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1374733" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-26272" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2016-007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3700" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838832" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1374733" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://issues.asterisk.org/jira/browse/ASTERISK-26272" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-03-31 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
tcptls.c in the TCP/TLS server in Asterisk Open Source 1.6.1.x before 1.6.1.23, 1.6.2.x before 1.6.2.17.1, and 1.8.x before 1.8.3.1 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by establishing many short TCP sessions to services that use a certain TLS API.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "DBFF2686-0F5C-4F20-AA93-6B63C5ADCD82", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1:beta1:*:*:*:*:*:*", "matchCriteriaId": "6D4A9B22-7978-44F3-A30C-65FE7024AB6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1:beta2:*:*:*:*:*:*", "matchCriteriaId": "06219062-9CAD-49D2-823E-E11E74B131D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1:beta3:*:*:*:*:*:*", "matchCriteriaId": "91420C0D-C63B-4916-8335-6BE24EB738FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1:beta4:*:*:*:*:*:*", "matchCriteriaId": "FD1D7D08-AC94-49AC-9F16-A6E91F1F1EEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "05FDA8EA-6610-4D49-9825-34EBFAAD2691", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B8FE4BCF-9AE7-4F41-BA84-E9537CC1EBE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F25B0D15-7C09-4BBB-AC84-A1898F448DB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F259057F-3720-45D8-91B4-70A11B759794", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "A106C460-4CE2-4AC3-B2FD-310F05507511", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "3E119FF9-2AD3-450D-8BBF-C6DD063246EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "759221D5-FC37-446D-9628-233B8D0B9120", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F82D4812-0429-42D4-BD27-C76CB9E7C368", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8FE11D6-8C0A-450E-B6DA-3AFE04D82232", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "5D1FBCC8-4637-4A67-BFFD-C052C3C03C12", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "F7307E10-9FA5-4940-B837-7936384F61DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "3D0DC9D6-D4D6-46CB-98DA-F4FC1835B6B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBBD0747-F3FF-46D8-A3C4-8268E37BC5AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.7:rc1:*:*:*:*:*:*", "matchCriteriaId": "3F759F27-008E-47FB-AC0A-EF11DA19918E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.7:rc2:*:*:*:*:*:*", "matchCriteriaId": "D15C82BA-BD1F-4A19-A907-E6C30042F537", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "2E802481-C8BD-4218-8CDC-5DB112DA946C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "D6FC8A53-E3C0-4660-BE75-2B5B8B4F8160", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "93C020CD-D0EA-4B3E-B33C-F900B08B28FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:rc1:*:*:*:*:*:*", "matchCriteriaId": "0004AADE-1652-4242-A97D-E9818FE03CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:rc2:*:*:*:*:*:*", "matchCriteriaId": "543E9C91-60FE-43AE-9B94-08DD730BA814", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:rc3:*:*:*:*:*:*", "matchCriteriaId": "252849FA-F46E-4F5A-A488-AA53574CA884", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "9EB89B4F-9546-4DF0-B69F-1B9F289BB1E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "2E254415-1D59-4A77-80FB-AE3EF10FBB32", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.12:rc1:*:*:*:*:*:*", "matchCriteriaId": "DF2407D0-C324-45C4-9FBB-4294F747DBDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "F23A36CC-9AA2-4559-946D-6D0621664342", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.13:rc1:*:*:*:*:*:*", "matchCriteriaId": "89C40652-E180-416A-B88A-E6313530E98A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "A28C2C5D-A573-4036-A600-BE28A3E417B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.15:rc2:*:*:*:*:*:*", "matchCriteriaId": "EE162390-359F-4C5D-902B-275FB1FC3EF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "4A0A3750-0D34-4FB5-B897-17CA0D0B7CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "D11BE58D-5B7E-4BB5-988A-7FC2E4B92C4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "22631AE6-5DA1-46C6-A239-C232DA0D0E7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.18:rc1:*:*:*:*:*:*", "matchCriteriaId": "9F5CB8CC-4CC1-4A1B-8AD1-C876D1BC80EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.18:rc2:*:*:*:*:*:*", "matchCriteriaId": "8591DB43-EAA0-4D58-BA23-EAD916DEA3DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "4E4747F8-1AFC-4AEF-82D8-D6604FB5222E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.19:rc1:*:*:*:*:*:*", "matchCriteriaId": "B82172C9-EA5B-4FC9-A445-0A297AE56FF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.19:rc2:*:*:*:*:*:*", "matchCriteriaId": "0C71CDAB-A299-4F1D-942D-851C899E63BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.19:rc3:*:*:*:*:*:*", "matchCriteriaId": "E2FA9AB9-4C83-45A3-9772-3A16030DBF1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "A88C639A-9229-4D99-9087-1B0B95539BD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.20:rc1:*:*:*:*:*:*", "matchCriteriaId": "0B7DE987-7351-495A-8776-37E6B7BF0C0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.20:rc2:*:*:*:*:*:*", "matchCriteriaId": "CB5823CC-941F-47AB-AD1F-325181D40E60", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "712AF374-846D-4F21-91C4-1BA9AB33E46D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "E431AF4E-C6A8-424F-9205-01F5FDFB3306", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1F8B700A-FACB-4BC8-9DF2-972DC63D852B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FFD31B9B-2F43-4637-BE56-47A807384BF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "E6450D6B-C907-49E6-9788-E4029C09285F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "DDB0432E-024A-4C0C-87FF-448E513D2834", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "D6A6A343-FEA2-49E5-9858-455AE3B29470", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc6:*:*:*:*:*:*", "matchCriteriaId": "D57B94E3-EA37-466C-ADC4-5180D4502FDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc7:*:*:*:*:*:*", "matchCriteriaId": "64D35A89-6B21-4770-AA0F-424C5C91A254", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc8:*:*:*:*:*:*", "matchCriteriaId": "14817302-A34A-4980-B148-AEB4B3B49BE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "61FDFA96-E62A-413B-9846-F51F1F7349EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "DA924386-49F6-4371-B975-B1473EEA12F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "B74A1B99-8901-4690-B994-1DAD3EFA5ABB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "4253C7DD-3588-4B35-B96D-C027133BE93F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "24AE11DB-16D3-42BF-BC64-E8982107D35B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "53841D77-926C-4362-BC85-BD8B6AC4391D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "F98FD6E6-EDE9-437D-B7C2-2DB65B73D230", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "4BA6CA77-D358-4623-8400-78EFC47ADB7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "B4E62DAB-45E0-4EAA-8E45-6D3757A679D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.15:rc1:*:*:*:*:*:*", "matchCriteriaId": "1355578C-B384-401A-9123-2789CBECAD0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "3491F8DB-A162-4608-B5F9-5401FE058CEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16:rc1:*:*:*:*:*:*", "matchCriteriaId": "C52730A8-D96E-46C1-8905-1D78A93E9C84", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "C6E5CD17-B14A-4BDB-BA75-261344FF6F25", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "EEED6C07-CFB7-44DC-9A41-9B6271942123", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:rc1:*:*:*:*:*:*", "matchCriteriaId": "0864DAF9-B7FA-4018-99F4-F2A7AA6FBBB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:rc2:*:*:*:*:*:*", "matchCriteriaId": "694B257B-E73B-4534-B316-87284FA45534", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:rc3:*:*:*:*:*:*", "matchCriteriaId": "418FD91F-014E-4529-8D72-D3FB27788EEA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6344E43-E8AA-4340-B3A7-72F5D6A5D184", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "4C170C1C-909D-4439-91B5-DB1A9CD150C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EE821BE5-B1D3-4854-A700-3A83E5F15724", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "149C57CA-0B4B-4220-87FC-432418D1C393", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "035595D5-BBEC-4D85-AD7A-A2C932D2BA70", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "6DAF5655-F09F-47F8-AFA6-4B95F77A57F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F8E001D8-0A7B-4FDD-88E3-E124ED32B81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9D5CFFBD-785F-4417-A54A-F3565FD6E736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "D30EF999-92D1-4B19-8E32-1E4B35DE4EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "A67D156B-9C43-444F-ADEC-B21D99D1433C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "893EB152-6444-43DB-8714-9735354C873A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8447EE7-A834-41D7-9204-07BD3752870C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C04F2C9-5672-42F2-B664-A3EE4C954C29", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "33465668-4C91-4619-960A-D26D77853E53", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "CAD08674-0B44-44EA-940B-6812E2D5077D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "EEE87710-A129-43AA-BA08-8001848975FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F582C6E-5DA0-4D72-A40E-66BDBC5CF2B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CEBB8-01B3-4A05-AFE8-37A143C9833E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "2FAC47DD-B613-43E4-B9BF-6120B81D9789", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "86D20CB5-60E8-405E-B387-CF80C7DA5E07", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "71AB5A01-5961-4053-9111-CF32C6473A00", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*", "matchCriteriaId": "77D8E1DC-041F-4B87-AF9A-E0EC4D6A4BD8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "tcptls.c in the TCP/TLS server in Asterisk Open Source 1.6.1.x before 1.6.1.23, 1.6.2.x before 1.6.2.17.1, and 1.8.x before 1.8.3.1 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by establishing many short TCP sessions to services that use a certain TLS API." }, { "lang": "es", "value": "tcptls.c en el servidor TCP/TLS en Asterisk Open Source v1.6.1.x anterior a v1.6.1.23, v1.6.2.x anterior a v1.6.2.17.1, y v1.8.x anterior a v1.8.3.1 permite a atacantes remotos causar una denegaci\u00f3n de servicio (desreferencia a un puntero NUL) mediante el establecimiento de muchas sesiones TCP cortas a los servicios que utilizan una cierta API de TLS." } ], "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\r\n\u0027CWE-476: NULL Pointer Dereference\u0027", "id": "CVE-2011-1175", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-03-31T22:55:03.223", "references": [ { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2011-004.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056945.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057156.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057163.html" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2011/03/17/5" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/03/21/12" }, { "source": "secalert@redhat.com", "url": "http://securitytracker.com/id?1025224" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2011/dsa-2225" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/46898" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0686" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0790" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=688678" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2011-004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056945.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057156.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057163.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2011/03/17/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/03/21/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1025224" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2225" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46898" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0686" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0790" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=688678" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66140" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-11-24 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
The (1) VoIP channel drivers, (2) DUNDi, and (3) Asterisk Manager Interface (AMI) in Asterisk Open Source 1.8.x before 1.8.32.1, 11.x before 11.14.1, 12.x before 12.7.1, and 13.x before 13.0.1 and Certified Asterisk 1.8.28 before 1.8.28-cert3 and 11.6 before 11.6-cert8 allows remote attackers to bypass the ACL restrictions via a packet with a source IP that does not share the address family as the first ACL entry.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digium | certified_asterisk | 1.8.28 | |
digium | certified_asterisk | 1.8.28 | |
digium | certified_asterisk | 1.8.28.0 | |
digium | certified_asterisk | 11.6 | |
digium | certified_asterisk | 11.6 | |
digium | certified_asterisk | 11.6 |