cve-2008-1332
Vulnerability from cvelistv5
Published
2008-03-20 00:00
Modified
2024-08-07 08:17
Severity ?
Summary
Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header.
References
cve@mitre.orghttp://downloads.digium.com/pub/security/AST-2008-003.htmlPatch
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html
cve@mitre.orghttp://secunia.com/advisories/29426Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/29456Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/29470Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/29782Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/29957Vendor Advisory
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200804-13.xml
cve@mitre.orghttp://securitytracker.com/id?1019629
cve@mitre.orghttp://www.asterisk.org/node/48466
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1525
cve@mitre.orghttp://www.securityfocus.com/archive/1/489818/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/28310
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/0928
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/41308
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html
af854a3a-2127-422b-91ae-364da2661108http://downloads.digium.com/pub/security/AST-2008-003.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29426Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29456Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29470Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29782Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29957Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200804-13.xml
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1019629
af854a3a-2127-422b-91ae-364da2661108http://www.asterisk.org/node/48466
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1525
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/489818/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28310
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/0928
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/41308
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:17:34.472Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SUSE-SR:2008:010",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html"
          },
          {
            "name": "29782",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29782"
          },
          {
            "name": "GLSA-200804-13",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200804-13.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://downloads.digium.com/pub/security/AST-2008-003.html"
          },
          {
            "name": "28310",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28310"
          },
          {
            "name": "20080318 AST-2008-003: Unauthenticated calls allowed from SIP channel driver",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/489818/100/0/threaded"
          },
          {
            "name": "DSA-1525",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1525"
          },
          {
            "name": "29426",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29426"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.asterisk.org/node/48466"
          },
          {
            "name": "FEDORA-2008-2554",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
          },
          {
            "name": "1019629",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1019629"
          },
          {
            "name": "asterisk-sip-security-bypass(41308)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41308"
          },
          {
            "name": "ADV-2008-0928",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0928"
          },
          {
            "name": "FEDORA-2008-2620",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
          },
          {
            "name": "29957",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29957"
          },
          {
            "name": "29456",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29456"
          },
          {
            "name": "29470",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29470"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-03-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "SUSE-SR:2008:010",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html"
        },
        {
          "name": "29782",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29782"
        },
        {
          "name": "GLSA-200804-13",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200804-13.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://downloads.digium.com/pub/security/AST-2008-003.html"
        },
        {
          "name": "28310",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28310"
        },
        {
          "name": "20080318 AST-2008-003: Unauthenticated calls allowed from SIP channel driver",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/489818/100/0/threaded"
        },
        {
          "name": "DSA-1525",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1525"
        },
        {
          "name": "29426",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29426"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.asterisk.org/node/48466"
        },
        {
          "name": "FEDORA-2008-2554",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
        },
        {
          "name": "1019629",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1019629"
        },
        {
          "name": "asterisk-sip-security-bypass(41308)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41308"
        },
        {
          "name": "ADV-2008-0928",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0928"
        },
        {
          "name": "FEDORA-2008-2620",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
        },
        {
          "name": "29957",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29957"
        },
        {
          "name": "29456",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29456"
        },
        {
          "name": "29470",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29470"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1332",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SUSE-SR:2008:010",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html"
            },
            {
              "name": "29782",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29782"
            },
            {
              "name": "GLSA-200804-13",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200804-13.xml"
            },
            {
              "name": "http://downloads.digium.com/pub/security/AST-2008-003.html",
              "refsource": "CONFIRM",
              "url": "http://downloads.digium.com/pub/security/AST-2008-003.html"
            },
            {
              "name": "28310",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28310"
            },
            {
              "name": "20080318 AST-2008-003: Unauthenticated calls allowed from SIP channel driver",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/489818/100/0/threaded"
            },
            {
              "name": "DSA-1525",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1525"
            },
            {
              "name": "29426",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29426"
            },
            {
              "name": "http://www.asterisk.org/node/48466",
              "refsource": "CONFIRM",
              "url": "http://www.asterisk.org/node/48466"
            },
            {
              "name": "FEDORA-2008-2554",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
            },
            {
              "name": "1019629",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1019629"
            },
            {
              "name": "asterisk-sip-security-bypass(41308)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41308"
            },
            {
              "name": "ADV-2008-0928",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0928"
            },
            {
              "name": "FEDORA-2008-2620",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
            },
            {
              "name": "29957",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29957"
            },
            {
              "name": "29456",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29456"
            },
            {
              "name": "29470",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29470"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1332",
    "datePublished": "2008-03-20T00:00:00",
    "dateReserved": "2008-03-13T00:00:00",
    "dateUpdated": "2024-08-07T08:17:34.472Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2008-1332\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-03-20T00:44:00.000\",\"lastModified\":\"2024-11-21T00:44:17.453\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad no especificada en Asterisk Open Source versiones 1.2.x anteriores a 1.2.27, 1.4.x anteriores a 1.4.18.1 y 1.4.19-rc3; en Business Edition versiones A.x.x, B.x.x anteriores a B.2.5.1, y C.x.x anteriores a C.1.6.2; en AsteriskNOW versiones 1.0.x anteriores a 1.0.2; Appliance Developer Kit anteriores a 1.4 revisi\u00f3n 109393; y s800i versiones 1.0.x anteriores a 1.1.0.2 permite a atacantes remotos acceder al controlador del canal SIP mediante la utilizaci\u00f3n de una cabecera From especialmente construida.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:N\",\"baseScore\":8.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":9.2,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk:a:*:business:*:*:*:*:*\",\"matchCriteriaId\":\"C6702046-43CF-4C84-9F76-24716C9F7D20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk:b.1.3.2:*:business:*:*:*:*:*\",\"matchCriteriaId\":\"524CF00B-1B36-4C1F-80B4-28349891669B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk:b.1.3.3:*:business:*:*:*:*:*\",\"matchCriteriaId\":\"2942FA48-42CE-4E67-A5BF-7852652EDE28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk:b.2.2.0:*:business:*:*:*:*:*\",\"matchCriteriaId\":\"4160A834-9194-474C-819B-60627E470D13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk:b.2.2.1:*:business:*:*:*:*:*\",\"matchCriteriaId\":\"D81F6E55-80F1-4770-9FF0-305EEEF3C4E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk:b.2.3.1:*:business:*:*:*:*:*\",\"matchCriteriaId\":\"087DC9EC-0DF2-48AE-BB62-8DDF95C3EC56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk:b.2.3.2:*:business:*:*:*:*:*\",\"matchCriteriaId\":\"471032A5-5EB6-44D1-91C8-BEA42C1E205A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk:b.2.3.3:*:business:*:*:*:*:*\",\"matchCriteriaId\":\"6FEB3FCA-065E-4C32-A4C7-F2C79F214F17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk:b.2.3.4:*:business:*:*:*:*:*\",\"matchCriteriaId\":\"636D765F-C47B-4762-9419-D7B51FA38AEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk:b.2.3.5:*:business:*:*:*:*:*\",\"matchCriteriaId\":\"36F29EE8-E05F-4F0A-B0FA-66C551856C3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk:b.2.3.6:*:business:*:*:*:*:*\",\"matchCriteriaId\":\"CEAA72FE-E13C-4363-AF5C-7D1CEEE2FA77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk:c.1.0_beta7:*:business:*:*:*:*:*\",\"matchCriteriaId\":\"D0A87D63-35F5-47D7-893B-E8B179B16C3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk:c.1.0_beta8:*:business:*:*:*:*:*\",\"matchCriteriaId\":\"95C1809E-9031-483F-B873-160284FA71D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk:c.1.6:*:business:*:*:*:*:*\",\"matchCriteriaId\":\"E35C336A-A786-476B-8B9F-E682D999B6AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk:c.1.6.1:*:business:*:*:*:*:*\",\"matchCriteriaId\":\"8121721B-EBC6-44EA-86D6-7B0FF1C8FF52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.4\",\"matchCriteriaId\":\"DEF22BFB-2B22-4FBE-AE35-D7BC2A461865\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C05B437-C292-4AA0-8AFE-1CA07CD80034\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0102C4C0-1A7D-4AB7-9817-44E6B0DB761E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81DDF486-4185-48EE-869E-0AA6726C31F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF45A8E1-F6B1-42BD-9168-12062FA6EAEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5757B9B-2759-439A-9A6D-CCDD6C8C8940\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4548D39-0562-4946-AA51-A7C1A31AEE8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCD71268-EAA2-477B-8AC4-DE4853A262B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"529B2115-A191-4F3F-8F8C-A38B7C45463A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76EFDCA-20EC-4C62-A0AD-CBD317D69441\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"a\",\"matchCriteriaId\":\"D4EC98BF-00C0-48F5-ADFA-DB8AC6E95F3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"b.2.5.0\",\"matchCriteriaId\":\"9E140B81-4528-4BCC-AE60-B91DD4B2C9FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"c.1.6.1\",\"matchCriteriaId\":\"8E8CF6B9-050B-426B-86FC-8A32E8C09A68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisknow:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.0.1\",\"matchCriteriaId\":\"B7C58E6B-AECC-48AF-8059-61772690776A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisknow:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC6FE17C-3B08-4675-9F73-5DC0C2438BB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.2.26\",\"matchCriteriaId\":\"A66DC4A6-290C-48ED-A0F8-8DC05EA0AAC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.4.17\",\"matchCriteriaId\":\"6CEDD6A3-13B1-4553-8BAD-93DB5203F3B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:*:rc-2:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.4.19\",\"matchCriteriaId\":\"F4AB8D8F-15AC-4516-85A2-B5D2B5B3DF04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"678DB154-4363-42FF-8B28-367923FC6595\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8F2C378-FF0E-4765-9F66-625C4064D5CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A55A9295-F632-4856-90A1-38371EB98589\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FAE6AF1-884D-41F7-B174-9E13C7719C99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCA9E35B-9A6B-42F2-9315-9C7D09F62227\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.0.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89B1F293-4F0F-48FD-A1F1-1230B94D87D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDF7EC20-A424-45E5-B7E4-3CC86075858C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C790E105-55C8-4CDC-9FA8-E1FF6F130A67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44C860EF-2B29-4995-B942-000CC43FDD14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ADB80EF-C724-44BA-88FC-24087799D0C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78B39BE8-7E2D-42DF-8633-44CAD5662777\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F39036E3-0027-4C72-9DEB-9A6E2B4512C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A037E6F9-3EF7-4EEB-AC16-081421BCE40D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.0.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A7EC02A-9C9E-4589-BBB3-1908D3078A7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C70FA9C-6F3B-4BDF-97FB-81D06AB0EE65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F7971E1-F136-4ADC-95EC-BC4F92E838CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E62D108C-862D-4BDB-BE37-285AA4C9C59A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF1422F3-829D-498C-83A6-02989DFB70A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBEB9D69-A404-4053-92F9-CAC3481AFF1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.0beta2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7B2F43B-8B69-4BF6-86B7-A225175FF068\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27202966-2C41-4964-9497-1887D2A834C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1471B5A2-15BE-4E7C-BA49-2E6002F7C8EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7108D72F-5AFD-4EEF-B2A9-CA4FA792E193\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"107DA2D8-FE7C-4B70-856D-43D58B988694\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABD71DD9-8A15-45E2-9FB3-F0544D7E1B80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C14614F-4E27-40A6-9E56-2B1DBB10330B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A2F2F5A-66FD-4057-917C-66332A88D83E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"399B0206-B48B-46EF-8CA6-A6E5A2550B25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26E9760F-C0EB-47BB-8DA4-CC7815099DAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C510A9A-C3E2-4AF8-9919-1A22E918CDEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BD915CD-A7D3-4305-A6C0-290C648A226C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E79CCE5-C29B-4726-8D2F-BC20F70959BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F29C13DB-6F04-4B41-90A2-2408D70F3641\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F4F734E-0E78-4957-B323-8E9FBA7FF15C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A4B117B-E945-4033-A79D-10DFAA3DF18B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA6D866F-8189-4FFD-AA24-47C0A015C246\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4EBFB79-C269-4132-BFAB-451F66CE8289\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9E1028E-2C07-4BA3-B891-FA853A87B280\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E74F577-70BD-4FAF-BCFD-10CD21FC5601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57BB03E2-E61C-4A94-82DF-8720698CE271\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B30A36F-5CE6-4246-8752-176FB5999C1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0F76DFD-4DAC-4B02-8967-B242CDEEF6C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A59BC20-3217-4584-9196-D1CD9E0D6B52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56F728BA-FC9E-4EEE-9A08-C9C7433BD8D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C64DF29-5B3D-401E-885E-8E37FD577254\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A7BF52A-2FF8-40ED-B757-28A1101DE8F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A321C2D-852B-4498-ADD6-79956410AB94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D5F0DCF-C6A2-4A09-90C9-D70F174FDEF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C820538E-14EC-43C1-80DB-6AAE4905EF0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A6D8FD0-C8C1-4868-9AF1-96B1949C18AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72A840B4-216B-4063-997F-791FBC8C8658\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"967DF432-DEF4-4FA2-8C8D-19A7FB663A33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.4.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"40850BF4-E252-4667-9B46-9B6FEF6E997D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.4.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BB01DD1-B29B-4210-88CC-9ADB3148A410\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.4.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C0FA6A3-BFA9-4397-B75B-75C8357C36B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"295D4042-2D3C-481B-B969-2DDAC1161198\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"044FD0D0-FC92-4A01-B0D4-11A703EF21FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.4.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3477EC1A-9634-492C-B052-35770A9C9F4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C90F104-FA2C-4091-B149-1774AC982C0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9328768-7C08-4143-B5F8-F5C2D735D21A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.4.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C04E2B3-094B-4828-A2FC-BB66244A9F73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.4.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BDE3D31-4BB2-45A3-B085-8C91152A3152\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.4.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE0107D4-395E-45F1-B963-7618CCC007D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.4.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53B8E11B-4984-45A8-A107-D276205988B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.4.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2495DB98-F923-4E60-86EC-2DBB7A98C90C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.4.16.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E186D125-996E-4900-A2B8-5CDC8B5D5136\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.4.16.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27DC6CF7-4DF8-4472-A684-8CCB5E26FCFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.4.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A838577-2BA1-4792-8B69-6FB07FFD7727\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.4.19:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4FF0F09-0268-480F-A2F3-6F8C3F323EEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:s800i:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.1.0.1\",\"matchCriteriaId\":\"6D1E04DC-AE6A-4536-8E45-36494E51B036\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:s800i:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C3A0A08-4107-4B8B-AE7E-DC23849A54DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:s800i:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9320928D-D83C-4258-AF62-AB2D1F50D972\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:s800i:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"569084D1-977D-41FC-A444-0B3F5199DDD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:s800i:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02D182FB-761C-4F08-A776-B613FAC55230\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:s800i:1.0.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9046D49-6878-4571-8B9E-2FBD5BA80D19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:s800i:1.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7B5EDAB-61DD-4864-A159-39292D339DA2\"}]}]}],\"references\":[{\"url\":\"http://downloads.digium.com/pub/security/AST-2008-003.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/29426\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29456\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29470\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29782\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29957\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200804-13.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1019629\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.asterisk.org/node/48466\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1525\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/489818/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/28310\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/0928\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/41308\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://downloads.digium.com/pub/security/AST-2008-003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/29426\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29456\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29470\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29782\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29957\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200804-13.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1019629\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.asterisk.org/node/48466\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1525\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/489818/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/28310\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/0928\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/41308\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.