Vulnerabilites related to digium - asterisk_business_edition
cve-2012-3863
Vulnerability from cvelistv5
Published
2012-07-09 10:00
Modified
2024-08-06 20:21
Severity ?
Summary
channels/chan_sip.c in Asterisk Open Source 1.8.x before 1.8.13.1 and 10.x before 10.5.2, Asterisk Business Edition C.3.x before C.3.7.5, Certified Asterisk 1.8.11-certx before 1.8.11-cert4, and Asterisk Digiumphones 10.x.x-digiumphones before 10.5.2-digiumphones does not properly handle a provisional response to a SIP reINVITE request, which allows remote authenticated users to cause a denial of service (RTP port exhaustion) via sessions that lack final responses.
References
http://secunia.com/advisories/50687third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/50756third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2012/dsa-2550vendor-advisory, x_refsource_DEBIAN
http://www.securityfocus.com/bid/54327vdb-entry, x_refsource_BID
http://downloads.asterisk.org/pub/security/AST-2012-010.htmlx_refsource_CONFIRM
https://issues.asterisk.org/jira/browse/ASTERISK-19992x_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:21:03.613Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "50687",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50687"
          },
          {
            "name": "50756",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50756"
          },
          {
            "name": "DSA-2550",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2550"
          },
          {
            "name": "54327",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/54327"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://downloads.asterisk.org/pub/security/AST-2012-010.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.asterisk.org/jira/browse/ASTERISK-19992"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-07-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "channels/chan_sip.c in Asterisk Open Source 1.8.x before 1.8.13.1 and 10.x before 10.5.2, Asterisk Business Edition C.3.x before C.3.7.5, Certified Asterisk 1.8.11-certx before 1.8.11-cert4, and Asterisk Digiumphones 10.x.x-digiumphones before 10.5.2-digiumphones does not properly handle a provisional response to a SIP reINVITE request, which allows remote authenticated users to cause a denial of service (RTP port exhaustion) via sessions that lack final responses."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-07-11T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "50687",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50687"
        },
        {
          "name": "50756",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50756"
        },
        {
          "name": "DSA-2550",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2550"
        },
        {
          "name": "54327",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/54327"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://downloads.asterisk.org/pub/security/AST-2012-010.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.asterisk.org/jira/browse/ASTERISK-19992"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-3863",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "channels/chan_sip.c in Asterisk Open Source 1.8.x before 1.8.13.1 and 10.x before 10.5.2, Asterisk Business Edition C.3.x before C.3.7.5, Certified Asterisk 1.8.11-certx before 1.8.11-cert4, and Asterisk Digiumphones 10.x.x-digiumphones before 10.5.2-digiumphones does not properly handle a provisional response to a SIP reINVITE request, which allows remote authenticated users to cause a denial of service (RTP port exhaustion) via sessions that lack final responses."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "50687",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/50687"
            },
            {
              "name": "50756",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/50756"
            },
            {
              "name": "DSA-2550",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2550"
            },
            {
              "name": "54327",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/54327"
            },
            {
              "name": "http://downloads.asterisk.org/pub/security/AST-2012-010.html",
              "refsource": "CONFIRM",
              "url": "http://downloads.asterisk.org/pub/security/AST-2012-010.html"
            },
            {
              "name": "https://issues.asterisk.org/jira/browse/ASTERISK-19992",
              "refsource": "CONFIRM",
              "url": "https://issues.asterisk.org/jira/browse/ASTERISK-19992"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-3863",
    "datePublished": "2012-07-09T10:00:00",
    "dateReserved": "2012-07-06T00:00:00",
    "dateUpdated": "2024-08-06T20:21:03.613Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2012-07-09 10:20
Modified
2024-11-21 01:41
Severity ?
Summary
channels/chan_sip.c in Asterisk Open Source 1.8.x before 1.8.13.1 and 10.x before 10.5.2, Asterisk Business Edition C.3.x before C.3.7.5, Certified Asterisk 1.8.11-certx before 1.8.11-cert4, and Asterisk Digiumphones 10.x.x-digiumphones before 10.5.2-digiumphones does not properly handle a provisional response to a SIP reINVITE request, which allows remote authenticated users to cause a denial of service (RTP port exhaustion) via sessions that lack final responses.
Impacted products
Vendor Product Version
digium asterisk_business_edition c.3.1
digium asterisk_business_edition c.3.3
digium asterisk_business_edition c.3.7.4
digium asterisk 1.8.0
digium asterisk 1.8.0
digium asterisk 1.8.0
digium asterisk 1.8.0
digium asterisk 1.8.0
digium asterisk 1.8.0
digium asterisk 1.8.0
digium asterisk 1.8.0
digium asterisk 1.8.0
digium asterisk 1.8.0
digium asterisk 1.8.1
digium asterisk 1.8.1
digium asterisk 1.8.1.1
digium asterisk 1.8.1.2
digium asterisk 1.8.2
digium asterisk 1.8.2.1
digium asterisk 1.8.2.2
digium asterisk 1.8.2.3
digium asterisk 1.8.2.4
digium asterisk 1.8.3
digium asterisk 1.8.3
digium asterisk 1.8.3
digium asterisk 1.8.3
digium asterisk 1.8.3.1
digium asterisk 1.8.3.2
digium asterisk 1.8.3.3
digium asterisk 1.8.4
digium asterisk 1.8.4
digium asterisk 1.8.4
digium asterisk 1.8.4
digium asterisk 1.8.4.1
digium asterisk 1.8.4.2
digium asterisk 1.8.4.3
digium asterisk 1.8.4.4
digium asterisk 1.8.5
digium asterisk 1.8.5
digium asterisk 1.8.5.0
digium asterisk 1.8.6.0
digium asterisk 1.8.6.0
digium asterisk 1.8.6.0
digium asterisk 1.8.6.0
digium asterisk 1.8.7.0
digium asterisk 1.8.7.0
digium asterisk 1.8.7.0
digium asterisk 1.8.7.1
digium asterisk 1.8.8.0
digium asterisk 1.8.8.0
digium asterisk 1.8.8.0
digium asterisk 1.8.8.0
digium asterisk 1.8.8.0
digium asterisk 1.8.8.1
digium asterisk 1.8.8.2
digium asterisk 1.8.9.0
digium asterisk 1.8.9.0
digium asterisk 1.8.9.0
digium asterisk 1.8.9.0
digium asterisk 1.8.9.2
digium asterisk 1.8.9.3
digium asterisk 1.8.11.0
digium asterisk 1.8.11.0
digium asterisk 1.8.11.0
digium asterisk 1.8.11.1
digium asterisk 1.8.13.0
digium asterisk 1.8.13.0
digium asterisk 1.8.13.0
digium asteriske 1.8.8.0
digium asteriske 1.8.9.1
digium certified_asterisk 1.8.11
digium certified_asterisk 1.8.11
digium asterisk 10.0.0
digium asterisk 10.0.0
digium asterisk 10.0.0
digium asterisk 10.0.0
digium asterisk 10.0.0
digium asterisk 10.0.0
digium asterisk 10.1.0
digium asterisk 10.1.0
digium asterisk 10.1.0
digium asterisk 10.2.0
digium asterisk 10.2.0
digium asterisk 10.2.0
digium asterisk 10.2.0
digium asterisk 10.2.0
digium asterisk 10.3.0
digium asterisk 10.3.0
digium asterisk 10.3.0
digium asterisk 10.4.0
digium asterisk 10.4.0
digium asterisk 10.4.0
digium asterisk 10.5.0
digium asterisk 10.5.0
digium asterisk 10.5.0
digium asterisk 10.5.1
digium asterisk 10.0.0
digium asterisk 10.0.0
digium asterisk 10.0.0
digium asterisk 10.0.0
digium asterisk 10.0.0
digium asterisk 10.0.0
digium asterisk 10.0.1
digium asterisk 10.1.0
digium asterisk 10.1.0
digium asterisk 10.1.0
digium asterisk 10.1.1
digium asterisk 10.1.2
digium asterisk 10.1.3
digium asterisk 10.2.0
digium asterisk 10.2.0
digium asterisk 10.2.0
digium asterisk 10.2.0
digium asterisk 10.2.0
digium asterisk 10.2.1
digium asterisk 10.3.0
digium asterisk 10.3.0
digium asterisk 10.3.0
digium asterisk 10.3.1
digium asterisk 10.4.0
digium asterisk 10.4.0
digium asterisk 10.4.0
digium asterisk 10.4.0
digium asterisk 10.4.1
digium asterisk 10.4.2
digium asterisk 10.5.0
digium asterisk 10.5.0
digium asterisk 10.5.0
digium asterisk 10.5.1
digium certified_asterisk 1.8.11
digium certified_asterisk 1.8.11
digium certified_asterisk 1.8.11
digium certified_asterisk 1.8.11



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:digium:asterisk_business_edition:c.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7E50F92-00C1-4908-AA34-03F0C8B47DA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk_business_edition:c.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "49842130-C25E-43F6-9EC0-A7018AD915B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk_business_edition:c.3.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F830CEB-2B0B-4713-8C26-9FADE6C47673",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6344E43-E8AA-4340-B3A7-72F5D6A5D184",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "4C170C1C-909D-4439-91B5-DB1A9CD150C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "EE821BE5-B1D3-4854-A700-3A83E5F15724",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "149C57CA-0B4B-4220-87FC-432418D1C393",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "035595D5-BBEC-4D85-AD7A-A2C932D2BA70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "6DAF5655-F09F-47F8-AFA6-4B95F77A57F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "F8E001D8-0A7B-4FDD-88E3-E124ED32B81C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "9D5CFFBD-785F-4417-A54A-F3565FD6E736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "D30EF999-92D1-4B19-8E32-1E4B35DE4EA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "A67D156B-9C43-444F-ADEC-B21D99D1433C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "893EB152-6444-43DB-8714-9735354C873A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F8447EE7-A834-41D7-9204-07BD3752870C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C04F2C9-5672-42F2-B664-A3EE4C954C29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "33465668-4C91-4619-960A-D26D77853E53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAD08674-0B44-44EA-940B-6812E2D5077D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE87710-A129-43AA-BA08-8001848975FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F582C6E-5DA0-4D72-A40E-66BDBC5CF2B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E7CEBB8-01B3-4A05-AFE8-37A143C9833E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "522733A7-E89E-4BFD-AC93-D6882636E880",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FAC47DD-B613-43E4-B9BF-6120B81D9789",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "86D20CB5-60E8-405E-B387-CF80C7DA5E07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "71AB5A01-5961-4053-9111-CF32C6473A00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "77D8E1DC-041F-4B87-AF9A-E0EC4D6A4BD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CCCB892-30CE-4BEF-904E-5D957F94D0EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F156798F-F2EF-4366-B17E-03165AB437D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EFBB9A6-DD1D-436E-919F-74A3E4F40396",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "054E34C8-B6A5-48C7-938E-D3C268E0E8BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1DCECA72-533A-4A95-AB19-20C5F09A1B01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "0E2309F8-AFEE-4150-99D1-BA606432ED73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "7785F282-BFA0-400A-8398-872ACCA4BF37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1278D3FB-78C6-4F7D-A845-0A93D4F6E2B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C00A6EFB-A848-46D3-AAD7-FD8140007E42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB6E3972-5C53-4B6D-BFE1-67E1122EA013",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "048617A0-A783-4519-A947-35220D4CD786",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD493A41-E686-444C-A34E-412804510F77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "87D25FD6-CC3A-4AB0-B7B1-67D07386F99D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C402E9E-09CC-4EFA-AC27-156437B05B22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8A41F9C-D2F4-47A9-80CD-2B1BF6B0CB63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "627FF5B9-E5A8-4DBC-A891-B175011E72A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "6146EB2E-BA32-4408-B10B-A711EC39C580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "1C863324-05AE-4FCA-BD2E-39040A468DCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A85F51E7-0AAE-4F3B-9F90-BD2E31255822",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "315FB0D4-D4A4-4369-BFB8-F2CAEB429015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "DC74D6C5-F410-4B68-AF92-056B727193A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B70911F8-A526-4600-8198-03FF4CCB28DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA60A9C9-C2EF-4971-BEFB-FF687DAEF2F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "BAFB22FA-CC24-4AFE-AC83-2D044563F7CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "00F3EB0D-7C63-46B5-BA95-8486B9716C78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "00C1BF3B-7593-478D-9AAA-153901C70286",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "5F86406A-0936-4A06-88FB-4137A64498EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "672CE4C0-EBD6-470B-937E-810FF1C4CDBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "88DB1105-74D8-4312-9D02-D1E21F2E785C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "404C0557-6229-4D90-BFDD-54AFFCCE6A19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "6D1D26CC-891F-4396-B7D7-30D712829E71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "F25B61EA-F4D1-452A-9D96-B8DFDD719B0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "9324AB96-EC99-4F04-A0A9-00F936C86EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDB6BBCA-47CE-49B8-9706-AFDE4BE46550",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BFF65E2-692B-4C39-88FC-6DED8D9A7258",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E8AE686-B618-4B0D-BD27-1F96295E964D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "E9751C0A-84F5-4A43-8282-12A9DE559569",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "F67E2694-F6F1-482C-91F2-D9FD856EA31B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E2D53AA-8D50-445F-9500-2F580F260DC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8880AE7C-3E44-4B76-B500-E93868D4CF5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "7C94269D-A271-42AC-A44C-102C814E564B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.13.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "E7E5B826-D3D5-4D2D-BB4D-2C1BEDE92456",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asteriske:1.8.8.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "5B9023E8-DB6F-4DE2-BB1E-D941BE279477",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asteriske:1.8.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF6135C4-7930-4DD5-80CD-4DC7F53956D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert:*:*:*:*:*:*",
              "matchCriteriaId": "C63C46CC-02E2-40AF-8281-F2FB5D89823A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert1:*:*:*:*:*:*",
              "matchCriteriaId": "71BAF2A7-024D-475A-88C0-0F5ADE3CA286",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:*:digiumphones:*:*:*:*:*",
              "matchCriteriaId": "6372EEEA-2759-4B6A-BD03-D84DC956E80E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta1:digiumphones:*:*:*:*:*",
              "matchCriteriaId": "26DF0C53-9F6A-4233-B163-AEC1F9886387",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta2:digiumphones:*:*:*:*:*",
              "matchCriteriaId": "79A063D7-553F-486F-9079-D95C8047B05E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc1:digiumphones:*:*:*:*:*",
              "matchCriteriaId": "B606D854-FC06-4314-AD24-FEEA3796A0AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc2:digiumphones:*:*:*:*:*",
              "matchCriteriaId": "DEBB0786-D912-48D1-BC63-E0F87E078154",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc3:digiumphones:*:*:*:*:*",
              "matchCriteriaId": "1C39DD70-1220-4CC6-95B4-CE18CA5787CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:*:digiumphones:*:*:*:*:*",
              "matchCriteriaId": "B0005F0B-9C87-4160-9416-A7C136FCD5AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc1:digiumphones:*:*:*:*:*",
              "matchCriteriaId": "12073B6A-14B1-490B-B267-A68194C68BDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc2:digiumphones:*:*:*:*:*",
              "matchCriteriaId": "198C92F2-8268-4045-B297-17E0D1F9726E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:*:digiumphones:*:*:*:*:*",
              "matchCriteriaId": "5D3A3C00-EA83-4EF4-8681-DB5616132607",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc1:digiumphones:*:*:*:*:*",
              "matchCriteriaId": "5FE59F0F-44B0-4940-8368-F360EE610114",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc2:digiumphones:*:*:*:*:*",
              "matchCriteriaId": "3647F0E3-196F-486B-9BAB-75ED24A055ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc3:digiumphones:*:*:*:*:*",
              "matchCriteriaId": "1FBC4A5F-FB16-42B2-9689-25F8B3D0F521",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc4:digiumphones:*:*:*:*:*",
              "matchCriteriaId": "B788D6E2-78E8-4DE1-81F5-40D52263E7F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:*:digiumphones:*:*:*:*:*",
              "matchCriteriaId": "51358F60-4D6C-4DBA-86B0-E12C48A67456",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc2:digiumphones:*:*:*:*:*",
              "matchCriteriaId": "D51C9952-97F4-4326-8F7D-34579D3686AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc3:digiumphones:*:*:*:*:*",
              "matchCriteriaId": "3711A75C-AF87-4A5C-8B35-1CF834C12D2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:*:digiumphones:*:*:*:*:*",
              "matchCriteriaId": "E7FFD09D-21A3-4E98-B1FA-C7A16C243D91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc1:digiumphones:*:*:*:*:*",
              "matchCriteriaId": "FAC6591A-BC5A-4CA9-90BC-0B686F74127B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc2:digiumphones:*:*:*:*:*",
              "matchCriteriaId": "01BAF29D-8679-40F3-AB6C-DA5C3787271C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:*:digiumphones:*:*:*:*:*",
              "matchCriteriaId": "B42229C3-B18E-4D50-9B98-202CB1805CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc1:digiumphones:*:*:*:*:*",
              "matchCriteriaId": "15DF192B-A8D5-4FCC-B469-505A8FA11D00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc2:digiumphones:*:*:*:*:*",
              "matchCriteriaId": "D24E01F7-604D-4D05-B698-3BDEF7B69EF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.5.1:*:digiumphones:*:*:*:*:*",
              "matchCriteriaId": "A54A74F4-8A6C-4090-88C2-8AB5A606C59B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "687ED3CE-67C4-410D-8AF4-C769015598F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "30E918CD-89C4-42DA-9709-E50E0A3FA736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "DA57FA15-D0D7-4A97-9C25-6F6566940098",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A1C45300-A2CF-40E7-AB67-23DC24C31A1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "958081DC-1D77-45CD-A940-C7A1AB42C7BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.0.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "298A879D-4F65-4523-A752-D17C4F81B822",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "37AB07BE-54C4-4972-A05F-D1E2CF4363CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBC63564-A84E-463D-8312-DDF1C6B7796F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "62A0906E-B631-4F3A-9ABC-9A43A43220BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "C6314ADA-2849-416D-966E-C01C322EF904",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B6CB1DD-614A-4B3D-99AE-9B1341427024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC95B04F-3746-4F1C-8428-A1FA10253E14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "20819080-E0AB-4879-B4CF-A154D6F7EF6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6C45753-E2CC-4F7C-B8DA-3D8CF255EA22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "5A080197-D6AA-4FDC-888E-51D1C8251E34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1F08D930-D4C1-4C63-875C-171C46AE97C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "1AA43D7D-AEAD-47CB-BFA5-B73004A1A7A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.2.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "B5ED5F6F-166D-4610-8939-A33AD45F1ADE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D40002A-564E-425C-BA2A-7C4A8F8DAFD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "521C4DB2-7127-4BA9-94FC-AB0E9E06FE2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "8C905DC1-8AB8-4D83-BB5B-FA4DABC58229",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.3.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "ECC74B5D-97A1-46FF-AFA3-5D5E4A0BF3A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2D98C7C-94A8-4348-AF22-04A41FB6F8EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "85D39A99-E9A6-4860-BC61-56CA2FC3238B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "845DA0A4-1983-4E82-99C8-B7FBF47C632E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "5A63FBB7-F1CF-4603-848F-980742D2ED36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.4.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "10B2084F-3AF4-4008-899C-6C1E43715201",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "217C13A5-9F8A-4392-858F-2FC88B03EB0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B282462-900C-492E-98DE-65364E62F5E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "687784F0-9ACC-435D-81F9-1E1B0F61010C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "9D7D020C-FE32-408B-BE37-58835FD3D95F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.5.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "39B7938F-7370-4F67-B0CD-1C14DE2E4E7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:10.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC587195-5973-423B-8BF9-3E0B27363B76",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert:*:*:*:*:*:*",
              "matchCriteriaId": "C63C46CC-02E2-40AF-8281-F2FB5D89823A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert1:*:*:*:*:*:*",
              "matchCriteriaId": "71BAF2A7-024D-475A-88C0-0F5ADE3CA286",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert2:*:*:*:*:*:*",
              "matchCriteriaId": "82F91FE8-C320-466B-AF08-67319A00A2BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:1.8.11:cert3:*:*:*:*:*:*",
              "matchCriteriaId": "DCFF0E1C-B455-4C18-8AA1-10408234327B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "channels/chan_sip.c in Asterisk Open Source 1.8.x before 1.8.13.1 and 10.x before 10.5.2, Asterisk Business Edition C.3.x before C.3.7.5, Certified Asterisk 1.8.11-certx before 1.8.11-cert4, and Asterisk Digiumphones 10.x.x-digiumphones before 10.5.2-digiumphones does not properly handle a provisional response to a SIP reINVITE request, which allows remote authenticated users to cause a denial of service (RTP port exhaustion) via sessions that lack final responses."
    },
    {
      "lang": "es",
      "value": "Asterisk Open Source v1.8.x anterior a v1.8.13.1 y v10.x anterior a v10.5.2, Asterisk Business Edition vC.3.x anterior a vC.3.7.5, Certified Asterisk v1.8.11-certx anterior a v1.8.11-cert4, y Asterisk Digiumphones v10.x.x-digiumphones anterior a v10.5.2-digiumphones no maneja una respuesta provisional a una petici\u00f3n SIP reINVITE de forma adecuada, lo que permite a atacantes remotos autenticados provocar una denegaci\u00f3n de servicio (agotamiento de puerto RTP) a trav\u00e9s de sesiones que carecen de repuestas finales."
    }
  ],
  "id": "CVE-2012-3863",
  "lastModified": "2024-11-21T01:41:45.430",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-07-09T10:20:44.823",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://downloads.asterisk.org/pub/security/AST-2012-010.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/50687"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/50756"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2012/dsa-2550"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/54327"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://issues.asterisk.org/jira/browse/ASTERISK-19992"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://downloads.asterisk.org/pub/security/AST-2012-010.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/50687"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/50756"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2550"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/54327"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.asterisk.org/jira/browse/ASTERISK-19992"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}