cve-2008-2119
Vulnerability from cvelistv5
Published
2008-06-04 19:17
Modified
2024-08-07 08:49
Severity ?
Summary
Asterisk Open Source 1.0.x and 1.2.x before 1.2.29 and Business Edition A.x.x and B.x.x before B.2.5.3, when pedantic parsing (aka pedanticsipchecking) is enabled, allows remote attackers to cause a denial of service (daemon crash) via a SIP INVITE message that lacks a From header, related to invocations of the ast_uri_decode function, and improper handling of (1) an empty const string and (2) a NULL pointer.
References
cve@mitre.orghttp://bugs.digium.com/view.php?id=12607
cve@mitre.orghttp://downloads.digium.com/pub/security/AST-2008-008.html
cve@mitre.orghttp://secunia.com/advisories/30517
cve@mitre.orghttp://secunia.com/advisories/34982
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200905-01.xml
cve@mitre.orghttp://svn.digium.com/view/asterisk?view=rev&revision=120109
cve@mitre.orghttp://www.securityfocus.com/archive/1/493020/100/0/threaded
cve@mitre.orghttp://www.securitytracker.com/id?1020166
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/1731
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/42823
cve@mitre.orghttps://www.exploit-db.com/exploits/5749
af854a3a-2127-422b-91ae-364da2661108http://bugs.digium.com/view.php?id=12607
af854a3a-2127-422b-91ae-364da2661108http://downloads.digium.com/pub/security/AST-2008-008.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30517
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34982
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200905-01.xml
af854a3a-2127-422b-91ae-364da2661108http://svn.digium.com/view/asterisk?view=rev&revision=120109
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/493020/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1020166
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1731
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/42823
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/5749
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T08:49:58.663Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "GLSA-200905-01",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://security.gentoo.org/glsa/glsa-200905-01.xml",
               },
               {
                  name: "30517",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/30517",
               },
               {
                  name: "5749",
                  tags: [
                     "exploit",
                     "x_refsource_EXPLOIT-DB",
                     "x_transferred",
                  ],
                  url: "https://www.exploit-db.com/exploits/5749",
               },
               {
                  name: "asterisk-asturidecode-dos(42823)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/42823",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://bugs.digium.com/view.php?id=12607",
               },
               {
                  name: "1020166",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id?1020166",
               },
               {
                  name: "20080603 AST-2008-008: Remote Crash Vulnerability in SIP channel driver when run in pedantic mode",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/493020/100/0/threaded",
               },
               {
                  name: "ADV-2008-1731",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2008/1731",
               },
               {
                  name: "34982",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/34982",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://svn.digium.com/view/asterisk?view=rev&revision=120109",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://downloads.digium.com/pub/security/AST-2008-008.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2008-06-03T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Asterisk Open Source 1.0.x and 1.2.x before 1.2.29 and Business Edition A.x.x and B.x.x before B.2.5.3, when pedantic parsing (aka pedanticsipchecking) is enabled, allows remote attackers to cause a denial of service (daemon crash) via a SIP INVITE message that lacks a From header, related to invocations of the ast_uri_decode function, and improper handling of (1) an empty const string and (2) a NULL pointer.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-11T19:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "GLSA-200905-01",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://security.gentoo.org/glsa/glsa-200905-01.xml",
            },
            {
               name: "30517",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/30517",
            },
            {
               name: "5749",
               tags: [
                  "exploit",
                  "x_refsource_EXPLOIT-DB",
               ],
               url: "https://www.exploit-db.com/exploits/5749",
            },
            {
               name: "asterisk-asturidecode-dos(42823)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/42823",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://bugs.digium.com/view.php?id=12607",
            },
            {
               name: "1020166",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id?1020166",
            },
            {
               name: "20080603 AST-2008-008: Remote Crash Vulnerability in SIP channel driver when run in pedantic mode",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/493020/100/0/threaded",
            },
            {
               name: "ADV-2008-1731",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2008/1731",
            },
            {
               name: "34982",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/34982",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://svn.digium.com/view/asterisk?view=rev&revision=120109",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://downloads.digium.com/pub/security/AST-2008-008.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2008-2119",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Asterisk Open Source 1.0.x and 1.2.x before 1.2.29 and Business Edition A.x.x and B.x.x before B.2.5.3, when pedantic parsing (aka pedanticsipchecking) is enabled, allows remote attackers to cause a denial of service (daemon crash) via a SIP INVITE message that lacks a From header, related to invocations of the ast_uri_decode function, and improper handling of (1) an empty const string and (2) a NULL pointer.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "GLSA-200905-01",
                     refsource: "GENTOO",
                     url: "http://security.gentoo.org/glsa/glsa-200905-01.xml",
                  },
                  {
                     name: "30517",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/30517",
                  },
                  {
                     name: "5749",
                     refsource: "EXPLOIT-DB",
                     url: "https://www.exploit-db.com/exploits/5749",
                  },
                  {
                     name: "asterisk-asturidecode-dos(42823)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/42823",
                  },
                  {
                     name: "http://bugs.digium.com/view.php?id=12607",
                     refsource: "CONFIRM",
                     url: "http://bugs.digium.com/view.php?id=12607",
                  },
                  {
                     name: "1020166",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id?1020166",
                  },
                  {
                     name: "20080603 AST-2008-008: Remote Crash Vulnerability in SIP channel driver when run in pedantic mode",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/493020/100/0/threaded",
                  },
                  {
                     name: "ADV-2008-1731",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2008/1731",
                  },
                  {
                     name: "34982",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/34982",
                  },
                  {
                     name: "http://svn.digium.com/view/asterisk?view=rev&revision=120109",
                     refsource: "CONFIRM",
                     url: "http://svn.digium.com/view/asterisk?view=rev&revision=120109",
                  },
                  {
                     name: "http://downloads.digium.com/pub/security/AST-2008-008.html",
                     refsource: "CONFIRM",
                     url: "http://downloads.digium.com/pub/security/AST-2008-008.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2008-2119",
      datePublished: "2008-06-04T19:17:00",
      dateReserved: "2008-05-08T00:00:00",
      dateUpdated: "2024-08-07T08:49:58.663Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2008-2119\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-06-04T19:32:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Asterisk Open Source 1.0.x and 1.2.x before 1.2.29 and Business Edition A.x.x and B.x.x before B.2.5.3, when pedantic parsing (aka pedanticsipchecking) is enabled, allows remote attackers to cause a denial of service (daemon crash) via a SIP INVITE message that lacks a From header, related to invocations of the ast_uri_decode function, and improper handling of (1) an empty const string and (2) a NULL pointer.\"},{\"lang\":\"es\",\"value\":\"Asterisk Open Source 1.0.x y 1.2.x anterior 1.2.29  y Business Edition A.x.x y B.x.x anterior B.2.5.3, cuando \\\"pedantic parsing\\\" (también conocido como pedanticsipchecking) está activado, permite a atacantes remotos provocar una denegación de servicio (caída de demonio) a través de un mensaje SIP INVITE que carece de una cabecera From, relacionado con la invocación de la función ast_uri_decode y el manejo incorrecto de (1) una cadena const vacía y (2) un puntero NULL.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"b2.5.2\",\"matchCriteriaId\":\"366DB62C-2E86-4614-AD9D-90C2F21434CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"802F8680-AB38-41AF-BFC8-F6927F6B1626\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCAE8D90-B032-4C60-B487-BE655D00FFAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB64A872-B7B8-46A8-81E4-49EDAC160531\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21000270-C9B9-430C-A252-763887A15835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12F7CF45-5482-4947-8F1D-48C746987475\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B64995D-7892-49AB-A89D-A5D15615C5D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0397DBD4-EA00-444A-9008-4932F99DF325\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FCD865F-BC39-4255-A797-6E5945773337\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4956871-4DD3-4299-8BEB-9D98A4449A42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:asterisk_business_edition:b2.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8936B494-E647-498B-8380-AE4DAD458533\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.2.28\",\"matchCriteriaId\":\"6CF7D9C2-C6B3-40E9-92B8-C504656BB176\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"678DB154-4363-42FF-8B28-367923FC6595\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8F2C378-FF0E-4765-9F66-625C4064D5CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A55A9295-F632-4856-90A1-38371EB98589\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FAE6AF1-884D-41F7-B174-9E13C7719C99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCA9E35B-9A6B-42F2-9315-9C7D09F62227\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDF7EC20-A424-45E5-B7E4-3CC86075858C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C790E105-55C8-4CDC-9FA8-E1FF6F130A67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44C860EF-2B29-4995-B942-000CC43FDD14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ADB80EF-C724-44BA-88FC-24087799D0C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78B39BE8-7E2D-42DF-8633-44CAD5662777\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F39036E3-0027-4C72-9DEB-9A6E2B4512C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A037E6F9-3EF7-4EEB-AC16-081421BCE40D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.0.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A7EC02A-9C9E-4589-BBB3-1908D3078A7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C70FA9C-6F3B-4BDF-97FB-81D06AB0EE65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F7971E1-F136-4ADC-95EC-BC4F92E838CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.0beta1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7435F043-F92B-4635-93CC-A2C39AAE1BCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.0beta2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7B2F43B-8B69-4BF6-86B7-A225175FF068\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27202966-2C41-4964-9497-1887D2A834C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1471B5A2-15BE-4E7C-BA49-2E6002F7C8EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E79CCE5-C29B-4726-8D2F-BC20F70959BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F29C13DB-6F04-4B41-90A2-2408D70F3641\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F4F734E-0E78-4957-B323-8E9FBA7FF15C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A4B117B-E945-4033-A79D-10DFAA3DF18B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA6D866F-8189-4FFD-AA24-47C0A015C246\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4EBFB79-C269-4132-BFAB-451F66CE8289\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9E1028E-2C07-4BA3-B891-FA853A87B280\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E74F577-70BD-4FAF-BCFD-10CD21FC5601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57BB03E2-E61C-4A94-82DF-8720698CE271\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B30A36F-5CE6-4246-8752-176FB5999C1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0F76DFD-4DAC-4B02-8967-B242CDEEF6C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A59BC20-3217-4584-9196-D1CD9E0D6B52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56F728BA-FC9E-4EEE-9A08-C9C7433BD8D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C64DF29-5B3D-401E-885E-8E37FD577254\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A7BF52A-2FF8-40ED-B757-28A1101DE8F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A321C2D-852B-4498-ADD6-79956410AB94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D5F0DCF-C6A2-4A09-90C9-D70F174FDEF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C820538E-14EC-43C1-80DB-6AAE4905EF0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9562112-2505-4F78-86DE-F30EFAEE47D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A6D8FD0-C8C1-4868-9AF1-96B1949C18AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72A840B4-216B-4063-997F-791FBC8C8658\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:asterisk:open_source:1.2.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE47A547-26E7-48F9-B0A6-2F65E04A1EDE\"}]}]}],\"references\":[{\"url\":\"http://bugs.digium.com/view.php?id=12607\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://downloads.digium.com/pub/security/AST-2008-008.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/30517\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/34982\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200905-01.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://svn.digium.com/view/asterisk?view=rev&revision=120109\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/493020/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1020166\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1731\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/42823\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.exploit-db.com/exploits/5749\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugs.digium.com/view.php?id=12607\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://downloads.digium.com/pub/security/AST-2008-008.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/30517\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/34982\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200905-01.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://svn.digium.com/view/asterisk?view=rev&revision=120109\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/493020/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1020166\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1731\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/42823\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.exploit-db.com/exploits/5749\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.