var-200803-0187
Vulnerability from variot
Multiple unspecified vulnerabilities in Fujitsu Interstage Smart Repository, as used in multiple Fujitsu Interstage products, allow remote attackers to cause a denial of service (daemon crash) via (1) an invalid request or (2) a large amount of data sent to the registered attribute value. Fujitsu Interstage Product Fujitsu Intersatage Smart The repository contains service disruptions ( daemon crash ) There is a vulnerability that becomes a condition.Service disruption by a third party via: ( Daemon crash ) There is a possibility of being put into a state. Remote attackers can exploit these issues to deny service to legitimate users. Currently, very little is known about these issues. We will update this BID as more information emerges. ----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched.
Download and test it today: https://psi.secunia.com/
Read more about this new version: https://psi.secunia.com/?page=changelog
TITLE: Fujitsu Interstage Smart Repository Denial of Service Vulnerabilities
SECUNIA ADVISORY ID: SA29250
VERIFY ADVISORY: http://secunia.com/advisories/29250/
CRITICAL: Less critical
IMPACT: DoS
WHERE:
From local network
SOFTWARE: Interstage Job Workload Server 8.x http://secunia.com/product/13686/ Interstage Apworks 8.x http://secunia.com/product/15987/ Interstage Apworks 7.x http://secunia.com/product/13689/ Interstage Application Server 8.x http://secunia.com/product/13685/ Interstage Application Server 7.x http://secunia.com/product/13692/ Interstage Business Application Server 8.x http://secunia.com/product/13687/
DESCRIPTION: Some vulnerabilities have been reported in various Fujitsu products, which can be exploited by malicious people to cause a DoS (Denial of Service). sending incorrect requests or sending overly large data.
Please see the vendor's advisory for a list of affected products and versions.
SOLUTION: Please see the vendor's advisory for patch details.
PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.
ORIGINAL ADVISORY: http://www.fujitsu.com/global/support/software/security/products-f/interstage-sr-200801e.html http://www.fujitsu.com/global/support/software/security/products-f/interstage-sr-200802e.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200803-0187", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "interstage application server plus", "scope": "eq", "trust": 1.9, "vendor": "fujitsu", "version": "7.0.1" }, { "model": "interstage application server plus", "scope": "eq", "trust": 1.9, "vendor": "fujitsu", "version": "7.0" }, { "model": "interstage application server standard j", "scope": "eq", "trust": 1.6, "vendor": "fujitsu", "version": "8.0.1" }, { "model": "interstage application server enterprise", "scope": "eq", "trust": 1.6, "vendor": "fujitsu", "version": "8.0.0" }, { "model": "interstage application server standard j", "scope": "eq", "trust": 1.6, "vendor": "fujitsu", "version": "8.0.0" }, { "model": "interstage application server enterprise", "scope": "eq", "trust": 1.6, "vendor": "fujitsu", "version": "7.0.1" }, { "model": "interstage application server standard j", "scope": "eq", "trust": 1.6, "vendor": "fujitsu", "version": "8.0.2" }, { "model": "interstage application server enterprise", "scope": "eq", "trust": 1.6, "vendor": "fujitsu", "version": "8.0.2" }, { "model": "interstage application server enterprise", "scope": "eq", "trust": 1.6, "vendor": "fujitsu", "version": "8.0.1" }, { "model": "interstage smart repository", "scope": null, "trust": 1.4, "vendor": "fujitsu", "version": null }, { "model": "interstage apworks enterprise", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "8.0.0" }, { "model": "interstage apworks standard j", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "8.0.0" }, { "model": "interstage smart repository", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "*" }, { "model": "interstage business application server", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "8.0" }, { "model": "interstage application server enterprise", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "7.0" }, { "model": "interstage apworks modelers j", "scope": "eq", "trust": 1.0, "vendor": "fujitsu", "version": "7.0" }, { "model": "interstage smart repository", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "0" }, { "model": "interstage business application server enterprise", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0.0" }, { "model": "interstage apworks standard-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0" }, { "model": "interstage apworks modelers-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "7.0" }, { "model": "interstage apworks enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0" }, { "model": "interstage application server standard-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0.2" }, { "model": "interstage application server standard-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0.1" }, { "model": "interstage application server standard-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0.2" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0.1" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "7.0.1" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "7.0" } ], "sources": [ { "db": "BID", "id": "28114" }, { "db": "JVNDB", "id": "JVNDB-2008-002815" }, { "db": "CNNVD", "id": "CNNVD-200803-092" }, { "db": "NVD", "id": "CVE-2008-1207" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:fujitsu:interstage_smart_repository", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-002815" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor disclosed these issues.", "sources": [ { "db": "BID", "id": "28114" } ], "trust": 0.3 }, "cve": "CVE-2008-1207", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2008-1207", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2008-1207", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2008-1207", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200803-092", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-002815" }, { "db": "CNNVD", "id": "CNNVD-200803-092" }, { "db": "NVD", "id": "CVE-2008-1207" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple unspecified vulnerabilities in Fujitsu Interstage Smart Repository, as used in multiple Fujitsu Interstage products, allow remote attackers to cause a denial of service (daemon crash) via (1) an invalid request or (2) a large amount of data sent to the registered attribute value. Fujitsu Interstage Product Fujitsu Intersatage Smart The repository contains service disruptions ( daemon crash ) There is a vulnerability that becomes a condition.Service disruption by a third party via: ( Daemon crash ) There is a possibility of being put into a state. \nRemote attackers can exploit these issues to deny service to legitimate users. \nCurrently, very little is known about these issues. We will update this BID as more information emerges. ----------------------------------------------------------------------\n\nA new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI\nhas been released. The new version includes many new and advanced\nfeatures, which makes it even easier to stay patched. \n\nDownload and test it today:\nhttps://psi.secunia.com/\n\nRead more about this new version:\nhttps://psi.secunia.com/?page=changelog\n\n----------------------------------------------------------------------\n\nTITLE:\nFujitsu Interstage Smart Repository Denial of Service Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA29250\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/29250/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nDoS\n\nWHERE:\n\u003eFrom local network\n\nSOFTWARE:\nInterstage Job Workload Server 8.x\nhttp://secunia.com/product/13686/\nInterstage Apworks 8.x\nhttp://secunia.com/product/15987/\nInterstage Apworks 7.x\nhttp://secunia.com/product/13689/\nInterstage Application Server 8.x\nhttp://secunia.com/product/13685/\nInterstage Application Server 7.x\nhttp://secunia.com/product/13692/\nInterstage Business Application Server 8.x\nhttp://secunia.com/product/13687/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in various Fujitsu products,\nwhich can be exploited by malicious people to cause a DoS (Denial of\nService). sending incorrect requests or sending overly large\ndata. \n\nPlease see the vendor\u0027s advisory for a list of affected products and\nversions. \n\nSOLUTION:\nPlease see the vendor\u0027s advisory for patch details. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nhttp://www.fujitsu.com/global/support/software/security/products-f/interstage-sr-200801e.html\nhttp://www.fujitsu.com/global/support/software/security/products-f/interstage-sr-200802e.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2008-1207" }, { "db": "JVNDB", "id": "JVNDB-2008-002815" }, { "db": "BID", "id": "28114" }, { "db": "PACKETSTORM", "id": "64315" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2008-1207", "trust": 2.7 }, { "db": "BID", "id": "28114", "trust": 1.9 }, { "db": "SECUNIA", "id": "29250", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2008-0786", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2008-002815", "trust": 0.8 }, { "db": "XF", "id": "41039", "trust": 0.6 }, { "db": "XF", "id": "41041", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200803-092", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "64315", "trust": 0.1 } ], "sources": [ { "db": "BID", "id": "28114" }, { "db": "JVNDB", "id": "JVNDB-2008-002815" }, { "db": "PACKETSTORM", "id": "64315" }, { "db": "CNNVD", "id": "CNNVD-200803-092" }, { "db": "NVD", "id": "CVE-2008-1207" } ] }, "id": "VAR-200803-0187", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.165530305 }, "last_update_date": "2024-11-23T22:50:11.657000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Cross site scripting (XSS) and denial of service (DoS) vulnerabilities in Interstage HTTP Server. December 25th, 2008", "trust": 0.8, "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-002815" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-002815" }, { "db": "NVD", "id": "CVE-2008-1207" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-sr-200801e.html" }, { "trust": 2.0, "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-sr-200802e.html" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/28114" }, { "trust": 1.6, "url": "http://secunia.com/advisories/29250" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2008/0786" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41041" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41039" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1207" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-1207" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/0786" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/41041" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/41039" }, { "trust": 0.3, "url": "http://www.fujitsu.com/global/services/software/interstage/" }, { "trust": 0.1, "url": "http://secunia.com/product/13686/" }, { "trust": 0.1, "url": "http://secunia.com/product/13692/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "https://psi.secunia.com/?page=changelog" }, { "trust": 0.1, "url": "https://psi.secunia.com/" }, { "trust": 0.1, "url": "http://secunia.com/product/13689/" }, { "trust": 0.1, "url": "http://secunia.com/product/13687/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/13685/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/29250/" }, { "trust": 0.1, "url": "http://secunia.com/product/15987/" } ], "sources": [ { "db": "BID", "id": "28114" }, { "db": "JVNDB", "id": "JVNDB-2008-002815" }, { "db": "PACKETSTORM", "id": "64315" }, { "db": "CNNVD", "id": "CNNVD-200803-092" }, { "db": "NVD", "id": "CVE-2008-1207" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "28114" }, { "db": "JVNDB", "id": "JVNDB-2008-002815" }, { "db": "PACKETSTORM", "id": "64315" }, { "db": "CNNVD", "id": "CNNVD-200803-092" }, { "db": "NVD", "id": "CVE-2008-1207" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-03-06T00:00:00", "db": "BID", "id": "28114" }, { "date": "2012-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-002815" }, { "date": "2008-03-12T17:55:23", "db": "PACKETSTORM", "id": "64315" }, { "date": "2008-03-07T00:00:00", "db": "CNNVD", "id": "CNNVD-200803-092" }, { "date": "2008-03-08T00:44:00", "db": "NVD", "id": "CVE-2008-1207" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-05-07T17:32:00", "db": "BID", "id": "28114" }, { "date": "2012-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-002815" }, { "date": "2008-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-200803-092" }, { "date": "2024-11-21T00:43:56.963000", "db": "NVD", "id": "CVE-2008-1207" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200803-092" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Fujitsu Interstage Smart Service disruption in the repository (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-002815" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-200803-092" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.