Vulnerabilites related to digium - s800i
cve-2011-1147
Vulnerability from cvelistv5
Published
2011-03-15 17:00
Modified
2024-08-06 22:14
Severity ?
Summary
Multiple stack-based and heap-based buffer overflows in the (1) decode_open_type and (2) udptl_rx_packet functions in main/udptl.c in Asterisk Open Source 1.4.x before 1.4.39.2, 1.6.1.x before 1.6.1.22, 1.6.2.x before 1.6.2.16.2, and 1.8 before 1.8.2.4; Business Edition C.x.x before C.3.6.3; AsteriskNOW 1.5; and s800i (Asterisk Appliance), when T.38 support is enabled, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UDPTL packet.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:14:27.830Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "43702",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43702"
          },
          {
            "name": "46474",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/46474"
          },
          {
            "name": "DSA-2225",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2225"
          },
          {
            "name": "43429",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43429"
          },
          {
            "name": "FEDORA-2011-2438",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055421.html"
          },
          {
            "name": "ADV-2011-0635",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0635"
          },
          {
            "name": "[oss-security] 20110311 CVE Request -- Asterisk AST-2011-002 / Multiple array overflow and crash vulnerabilities in UDPTL code",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/03/11/2"
          },
          {
            "name": "FEDORA-2011-2360",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055030.html"
          },
          {
            "name": "FEDORA-2011-2558",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055634.html"
          },
          {
            "name": "1025101",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025101"
          },
          {
            "name": "[oss-security] 20110311 Re: CVE Request -- Asterisk AST-2011-002 / Multiple array overflow and crash vulnerabilities in UDPTL code",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/03/11/8"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://downloads.asterisk.org/pub/security/AST-2011-002.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-03-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple stack-based and heap-based buffer overflows in the (1) decode_open_type and (2) udptl_rx_packet functions in main/udptl.c in Asterisk Open Source 1.4.x before 1.4.39.2, 1.6.1.x before 1.6.1.22, 1.6.2.x before 1.6.2.16.2, and 1.8 before 1.8.2.4; Business Edition C.x.x before C.3.6.3; AsteriskNOW 1.5; and s800i (Asterisk Appliance), when T.38 support is enabled, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UDPTL packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-08-23T09:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "43702",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43702"
        },
        {
          "name": "46474",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/46474"
        },
        {
          "name": "DSA-2225",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2225"
        },
        {
          "name": "43429",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43429"
        },
        {
          "name": "FEDORA-2011-2438",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055421.html"
        },
        {
          "name": "ADV-2011-0635",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0635"
        },
        {
          "name": "[oss-security] 20110311 CVE Request -- Asterisk AST-2011-002 / Multiple array overflow and crash vulnerabilities in UDPTL code",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/03/11/2"
        },
        {
          "name": "FEDORA-2011-2360",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055030.html"
        },
        {
          "name": "FEDORA-2011-2558",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055634.html"
        },
        {
          "name": "1025101",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025101"
        },
        {
          "name": "[oss-security] 20110311 Re: CVE Request -- Asterisk AST-2011-002 / Multiple array overflow and crash vulnerabilities in UDPTL code",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/03/11/8"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://downloads.asterisk.org/pub/security/AST-2011-002.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2011-1147",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple stack-based and heap-based buffer overflows in the (1) decode_open_type and (2) udptl_rx_packet functions in main/udptl.c in Asterisk Open Source 1.4.x before 1.4.39.2, 1.6.1.x before 1.6.1.22, 1.6.2.x before 1.6.2.16.2, and 1.8 before 1.8.2.4; Business Edition C.x.x before C.3.6.3; AsteriskNOW 1.5; and s800i (Asterisk Appliance), when T.38 support is enabled, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UDPTL packet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "43702",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43702"
            },
            {
              "name": "46474",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/46474"
            },
            {
              "name": "DSA-2225",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2225"
            },
            {
              "name": "43429",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43429"
            },
            {
              "name": "FEDORA-2011-2438",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055421.html"
            },
            {
              "name": "ADV-2011-0635",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0635"
            },
            {
              "name": "[oss-security] 20110311 CVE Request -- Asterisk AST-2011-002 / Multiple array overflow and crash vulnerabilities in UDPTL code",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/03/11/2"
            },
            {
              "name": "FEDORA-2011-2360",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055030.html"
            },
            {
              "name": "FEDORA-2011-2558",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055634.html"
            },
            {
              "name": "1025101",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025101"
            },
            {
              "name": "[oss-security] 20110311 Re: CVE Request -- Asterisk AST-2011-002 / Multiple array overflow and crash vulnerabilities in UDPTL code",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/03/11/8"
            },
            {
              "name": "http://downloads.asterisk.org/pub/security/AST-2011-002.html",
              "refsource": "CONFIRM",
              "url": "http://downloads.asterisk.org/pub/security/AST-2011-002.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-1147",
    "datePublished": "2011-03-15T17:00:00",
    "dateReserved": "2011-03-03T00:00:00",
    "dateUpdated": "2024-08-06T22:14:27.830Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-0495
Vulnerability from cvelistv5
Published
2011-01-20 18:00
Modified
2024-08-06 21:58
Severity ?
Summary
Stack-based buffer overflow in the ast_uri_encode function in main/utils.c in Asterisk Open Source before 1.4.38.1, 1.4.39.1, 1.6.1.21, 1.6.2.15.1, 1.6.2.16.1, 1.8.1.2, 1.8.2.; and Business Edition before C.3.6.2; when running in pedantic mode allows remote authenticated users to execute arbitrary code via crafted caller ID data in vectors involving the (1) SIP channel driver, (2) URIENCODE dialplan function, or (3) AGI dialplan function.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:58:24.451Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2011-0159",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0159"
          },
          {
            "name": "FEDORA-2011-0794",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053713.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://downloads.asterisk.org/pub/security/AST-2011-001.html"
          },
          {
            "name": "43373",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43373"
          },
          {
            "name": "ADV-2011-0449",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0449"
          },
          {
            "name": "70518",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/70518"
          },
          {
            "name": "45839",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/45839"
          },
          {
            "name": "ADV-2011-0281",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0281"
          },
          {
            "name": "FEDORA-2011-0774",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053689.html"
          },
          {
            "name": "DSA-2171",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2171"
          },
          {
            "name": "43119",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43119"
          },
          {
            "name": "asterisk-asturiencode-bo(64831)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64831"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://downloads.asterisk.org/pub/security/AST-2011-001-1.6.2.diff"
          },
          {
            "name": "20110118 AST-2011-001: Stack buffer overflow in SIP channel driver",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/515781/100/0/threaded"
          },
          {
            "name": "42935",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42935"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-01-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the ast_uri_encode function in main/utils.c in Asterisk Open Source before 1.4.38.1, 1.4.39.1, 1.6.1.21, 1.6.2.15.1, 1.6.2.16.1, 1.8.1.2, 1.8.2.; and Business Edition before C.3.6.2; when running in pedantic mode allows remote authenticated users to execute arbitrary code via crafted caller ID data in vectors involving the (1) SIP channel driver, (2) URIENCODE dialplan function, or (3) AGI dialplan function."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-09T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2011-0159",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0159"
        },
        {
          "name": "FEDORA-2011-0794",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053713.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://downloads.asterisk.org/pub/security/AST-2011-001.html"
        },
        {
          "name": "43373",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43373"
        },
        {
          "name": "ADV-2011-0449",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0449"
        },
        {
          "name": "70518",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/70518"
        },
        {
          "name": "45839",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/45839"
        },
        {
          "name": "ADV-2011-0281",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0281"
        },
        {
          "name": "FEDORA-2011-0774",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053689.html"
        },
        {
          "name": "DSA-2171",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2171"
        },
        {
          "name": "43119",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43119"
        },
        {
          "name": "asterisk-asturiencode-bo(64831)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64831"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://downloads.asterisk.org/pub/security/AST-2011-001-1.6.2.diff"
        },
        {
          "name": "20110118 AST-2011-001: Stack buffer overflow in SIP channel driver",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/515781/100/0/threaded"
        },
        {
          "name": "42935",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42935"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-0495",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the ast_uri_encode function in main/utils.c in Asterisk Open Source before 1.4.38.1, 1.4.39.1, 1.6.1.21, 1.6.2.15.1, 1.6.2.16.1, 1.8.1.2, 1.8.2.; and Business Edition before C.3.6.2; when running in pedantic mode allows remote authenticated users to execute arbitrary code via crafted caller ID data in vectors involving the (1) SIP channel driver, (2) URIENCODE dialplan function, or (3) AGI dialplan function."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2011-0159",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0159"
            },
            {
              "name": "FEDORA-2011-0794",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053713.html"
            },
            {
              "name": "http://downloads.asterisk.org/pub/security/AST-2011-001.html",
              "refsource": "CONFIRM",
              "url": "http://downloads.asterisk.org/pub/security/AST-2011-001.html"
            },
            {
              "name": "43373",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43373"
            },
            {
              "name": "ADV-2011-0449",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0449"
            },
            {
              "name": "70518",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/70518"
            },
            {
              "name": "45839",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/45839"
            },
            {
              "name": "ADV-2011-0281",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0281"
            },
            {
              "name": "FEDORA-2011-0774",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053689.html"
            },
            {
              "name": "DSA-2171",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2171"
            },
            {
              "name": "43119",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43119"
            },
            {
              "name": "asterisk-asturiencode-bo(64831)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64831"
            },
            {
              "name": "http://downloads.asterisk.org/pub/security/AST-2011-001-1.6.2.diff",
              "refsource": "MISC",
              "url": "http://downloads.asterisk.org/pub/security/AST-2011-001-1.6.2.diff"
            },
            {
              "name": "20110118 AST-2011-001: Stack buffer overflow in SIP channel driver",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/515781/100/0/threaded"
            },
            {
              "name": "42935",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42935"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-0495",
    "datePublished": "2011-01-20T18:00:00",
    "dateReserved": "2011-01-19T00:00:00",
    "dateUpdated": "2024-08-06T21:58:24.451Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-4055
Vulnerability from cvelistv5
Published
2009-12-02 11:00
Modified
2024-08-07 06:45
Severity ?
Summary
rtp.c in Asterisk Open Source 1.2.x before 1.2.37, 1.4.x before 1.4.27.1, 1.6.0.x before 1.6.0.19, and 1.6.1.x before 1.6.1.11; Business Edition B.x.x before B.2.5.13, C.2.x.x before C.2.4.6, and C.3.x.x before C.3.2.3; and s800i 1.3.x before 1.3.0.6 allows remote attackers to cause a denial of service (daemon crash) via an RTP comfort noise payload with a long data length.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:45:51.226Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "37153",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/37153"
          },
          {
            "name": "20091130 AST-2009-010: RTP Remote Crash Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/508147/100/0/threaded"
          },
          {
            "name": "37677",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37677"
          },
          {
            "name": "1023249",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1023249"
          },
          {
            "name": "DSA-1952",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1952"
          },
          {
            "name": "asterisk-rtp-comfortnoise-dos(54471)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54471"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.4.diff.txt"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.6.0.diff.txt"
          },
          {
            "name": "37530",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37530"
          },
          {
            "name": "FEDORA-2009-12461",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/archives/fedora-package-announce/2009-December/msg00759.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.asterisk.org/view.php?id=16242"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.6.1.diff.txt"
          },
          {
            "name": "37708",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37708"
          },
          {
            "name": "60569",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/60569"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://downloads.digium.com/pub/security/AST-2009-010.html"
          },
          {
            "name": "ADV-2009-3368",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3368"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.2.diff.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-11-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "rtp.c in Asterisk Open Source 1.2.x before 1.2.37, 1.4.x before 1.4.27.1, 1.6.0.x before 1.6.0.19, and 1.6.1.x before 1.6.1.11; Business Edition B.x.x before B.2.5.13, C.2.x.x before C.2.4.6, and C.3.x.x before C.3.2.3; and s800i 1.3.x before 1.3.0.6 allows remote attackers to cause a denial of service (daemon crash) via an RTP comfort noise payload with a long data length."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "37153",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/37153"
        },
        {
          "name": "20091130 AST-2009-010: RTP Remote Crash Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/508147/100/0/threaded"
        },
        {
          "name": "37677",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37677"
        },
        {
          "name": "1023249",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1023249"
        },
        {
          "name": "DSA-1952",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1952"
        },
        {
          "name": "asterisk-rtp-comfortnoise-dos(54471)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54471"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.4.diff.txt"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.6.0.diff.txt"
        },
        {
          "name": "37530",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37530"
        },
        {
          "name": "FEDORA-2009-12461",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.redhat.com/archives/fedora-package-announce/2009-December/msg00759.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.asterisk.org/view.php?id=16242"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.6.1.diff.txt"
        },
        {
          "name": "37708",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37708"
        },
        {
          "name": "60569",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/60569"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://downloads.digium.com/pub/security/AST-2009-010.html"
        },
        {
          "name": "ADV-2009-3368",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3368"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.2.diff.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-4055",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "rtp.c in Asterisk Open Source 1.2.x before 1.2.37, 1.4.x before 1.4.27.1, 1.6.0.x before 1.6.0.19, and 1.6.1.x before 1.6.1.11; Business Edition B.x.x before B.2.5.13, C.2.x.x before C.2.4.6, and C.3.x.x before C.3.2.3; and s800i 1.3.x before 1.3.0.6 allows remote attackers to cause a denial of service (daemon crash) via an RTP comfort noise payload with a long data length."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "37153",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/37153"
            },
            {
              "name": "20091130 AST-2009-010: RTP Remote Crash Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/508147/100/0/threaded"
            },
            {
              "name": "37677",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37677"
            },
            {
              "name": "1023249",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1023249"
            },
            {
              "name": "DSA-1952",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1952"
            },
            {
              "name": "asterisk-rtp-comfortnoise-dos(54471)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54471"
            },
            {
              "name": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.4.diff.txt",
              "refsource": "CONFIRM",
              "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.4.diff.txt"
            },
            {
              "name": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.6.0.diff.txt",
              "refsource": "CONFIRM",
              "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.6.0.diff.txt"
            },
            {
              "name": "37530",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37530"
            },
            {
              "name": "FEDORA-2009-12461",
              "refsource": "FEDORA",
              "url": "http://www.redhat.com/archives/fedora-package-announce/2009-December/msg00759.html"
            },
            {
              "name": "https://issues.asterisk.org/view.php?id=16242",
              "refsource": "CONFIRM",
              "url": "https://issues.asterisk.org/view.php?id=16242"
            },
            {
              "name": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.6.1.diff.txt",
              "refsource": "CONFIRM",
              "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.6.1.diff.txt"
            },
            {
              "name": "37708",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37708"
            },
            {
              "name": "60569",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/60569"
            },
            {
              "name": "http://downloads.digium.com/pub/security/AST-2009-010.html",
              "refsource": "CONFIRM",
              "url": "http://downloads.digium.com/pub/security/AST-2009-010.html"
            },
            {
              "name": "ADV-2009-3368",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3368"
            },
            {
              "name": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.2.diff.txt",
              "refsource": "CONFIRM",
              "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.2.diff.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-4055",
    "datePublished": "2009-12-02T11:00:00",
    "dateReserved": "2009-11-23T00:00:00",
    "dateUpdated": "2024-08-07T06:45:51.226Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-2726
Vulnerability from cvelistv5
Published
2009-08-12 10:00
Modified
2024-08-07 05:59
Severity ?
Summary
The SIP channel driver in Asterisk Open Source 1.2.x before 1.2.34, 1.4.x before 1.4.26.1, 1.6.0.x before 1.6.0.12, and 1.6.1.x before 1.6.1.4; Asterisk Business Edition A.x.x, B.x.x before B.2.5.9, C.2.x before C.2.4.1, and C.3.x before C.3.1; and Asterisk Appliance s800i 1.2.x before 1.3.0.3 does not use a maximum width when invoking sscanf style functions, which allows remote attackers to cause a denial of service (stack memory consumption) via SIP packets containing large sequences of ASCII decimal characters, as demonstrated via vectors related to (1) the CSeq value in a SIP header, (2) large Content-Length value, and (3) SDP.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:59:57.107Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://labs.mudynamics.com/advisories/MU-200908-01.txt"
          },
          {
            "name": "ADV-2009-2229",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/2229"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://downloads.digium.com/pub/security/AST-2009-005.html"
          },
          {
            "name": "36015",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/36015"
          },
          {
            "name": "20090811 AST-2009-005: Remote Crash Vulnerability in SIP channel driver",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/505669/100/0/threaded"
          },
          {
            "name": "1022705",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1022705"
          },
          {
            "name": "36227",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36227"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-08-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The SIP channel driver in Asterisk Open Source 1.2.x before 1.2.34, 1.4.x before 1.4.26.1, 1.6.0.x before 1.6.0.12, and 1.6.1.x before 1.6.1.4; Asterisk Business Edition A.x.x, B.x.x before B.2.5.9, C.2.x before C.2.4.1, and C.3.x before C.3.1; and Asterisk Appliance s800i 1.2.x before 1.3.0.3 does not use a maximum width when invoking sscanf style functions, which allows remote attackers to cause a denial of service (stack memory consumption) via SIP packets containing large sequences of ASCII decimal characters, as demonstrated via vectors related to (1) the CSeq value in a SIP header, (2) large Content-Length value, and (3) SDP."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://labs.mudynamics.com/advisories/MU-200908-01.txt"
        },
        {
          "name": "ADV-2009-2229",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/2229"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://downloads.digium.com/pub/security/AST-2009-005.html"
        },
        {
          "name": "36015",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/36015"
        },
        {
          "name": "20090811 AST-2009-005: Remote Crash Vulnerability in SIP channel driver",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/505669/100/0/threaded"
        },
        {
          "name": "1022705",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1022705"
        },
        {
          "name": "36227",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36227"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2726",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The SIP channel driver in Asterisk Open Source 1.2.x before 1.2.34, 1.4.x before 1.4.26.1, 1.6.0.x before 1.6.0.12, and 1.6.1.x before 1.6.1.4; Asterisk Business Edition A.x.x, B.x.x before B.2.5.9, C.2.x before C.2.4.1, and C.3.x before C.3.1; and Asterisk Appliance s800i 1.2.x before 1.3.0.3 does not use a maximum width when invoking sscanf style functions, which allows remote attackers to cause a denial of service (stack memory consumption) via SIP packets containing large sequences of ASCII decimal characters, as demonstrated via vectors related to (1) the CSeq value in a SIP header, (2) large Content-Length value, and (3) SDP."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://labs.mudynamics.com/advisories/MU-200908-01.txt",
              "refsource": "MISC",
              "url": "http://labs.mudynamics.com/advisories/MU-200908-01.txt"
            },
            {
              "name": "ADV-2009-2229",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/2229"
            },
            {
              "name": "http://downloads.digium.com/pub/security/AST-2009-005.html",
              "refsource": "CONFIRM",
              "url": "http://downloads.digium.com/pub/security/AST-2009-005.html"
            },
            {
              "name": "36015",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/36015"
            },
            {
              "name": "20090811 AST-2009-005: Remote Crash Vulnerability in SIP channel driver",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/505669/100/0/threaded"
            },
            {
              "name": "1022705",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1022705"
            },
            {
              "name": "36227",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/36227"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2726",
    "datePublished": "2009-08-12T10:00:00",
    "dateReserved": "2009-08-10T00:00:00",
    "dateUpdated": "2024-08-07T05:59:57.107Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-3727
Vulnerability from cvelistv5
Published
2009-11-10 18:00
Modified
2024-08-07 06:38
Severity ?
Summary
Asterisk Open Source 1.2.x before 1.2.35, 1.4.x before 1.4.26.3, 1.6.0.x before 1.6.0.17, and 1.6.1.x before 1.6.1.9; Business Edition A.x.x, B.x.x before B.2.5.12, C.2.x.x before C.2.4.5, and C.3.x.x before C.3.2.2; AsteriskNOW 1.5; and s800i 1.3.x before 1.3.0.5 generate different error messages depending on whether a SIP username is valid, which allows remote attackers to enumerate valid usernames via multiple crafted REGISTER messages with inconsistent usernames in the URI in the To header and the Digest in the Authorization header.
References
http://secunia.com/advisories/37265third-party-advisory, x_refsource_SECUNIA
https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00838.htmlvendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/37479third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/37677third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2009/dsa-1952vendor-advisory, x_refsource_DEBIAN
https://bugzilla.redhat.com/show_bug.cgi?id=523277x_refsource_CONFIRM
https://bugzilla.redhat.com/show_bug.cgi?id=533137x_refsource_CONFIRM
http://www.securityfocus.com/bid/36924vdb-entry, x_refsource_BID
https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00789.htmlvendor-advisory, x_refsource_FEDORA
http://osvdb.org/59697vdb-entry, x_refsource_OSVDB
http://downloads.asterisk.org/pub/security/AST-2009-008.htmlx_refsource_CONFIRM
http://www.securitytracker.com/id?1023133vdb-entry, x_refsource_SECTRACK
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:38:30.134Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "37265",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37265"
          },
          {
            "name": "FEDORA-2009-11126",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00838.html"
          },
          {
            "name": "37479",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37479"
          },
          {
            "name": "37677",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37677"
          },
          {
            "name": "DSA-1952",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1952"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=523277"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533137"
          },
          {
            "name": "36924",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/36924"
          },
          {
            "name": "FEDORA-2009-11070",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00789.html"
          },
          {
            "name": "59697",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/59697"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://downloads.asterisk.org/pub/security/AST-2009-008.html"
          },
          {
            "name": "1023133",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1023133"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-11-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Asterisk Open Source 1.2.x before 1.2.35, 1.4.x before 1.4.26.3, 1.6.0.x before 1.6.0.17, and 1.6.1.x before 1.6.1.9; Business Edition A.x.x, B.x.x before B.2.5.12, C.2.x.x before C.2.4.5, and C.3.x.x before C.3.2.2; AsteriskNOW 1.5; and s800i 1.3.x before 1.3.0.5 generate different error messages depending on whether a SIP username is valid, which allows remote attackers to enumerate valid usernames via multiple crafted REGISTER messages with inconsistent usernames in the URI in the To header and the Digest in the Authorization header."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-11-19T10:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "37265",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37265"
        },
        {
          "name": "FEDORA-2009-11126",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00838.html"
        },
        {
          "name": "37479",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37479"
        },
        {
          "name": "37677",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37677"
        },
        {
          "name": "DSA-1952",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1952"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=523277"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533137"
        },
        {
          "name": "36924",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/36924"
        },
        {
          "name": "FEDORA-2009-11070",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00789.html"
        },
        {
          "name": "59697",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/59697"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://downloads.asterisk.org/pub/security/AST-2009-008.html"
        },
        {
          "name": "1023133",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1023133"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2009-3727",
    "datePublished": "2009-11-10T18:00:00",
    "dateReserved": "2009-10-16T00:00:00",
    "dateUpdated": "2024-08-07T06:38:30.134Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2009-12-02 11:30
Modified
2024-11-21 01:08
Severity ?
Summary
rtp.c in Asterisk Open Source 1.2.x before 1.2.37, 1.4.x before 1.4.27.1, 1.6.0.x before 1.6.0.19, and 1.6.1.x before 1.6.1.11; Business Edition B.x.x before B.2.5.13, C.2.x.x before C.2.4.6, and C.3.x.x before C.3.2.3; and s800i 1.3.x before 1.3.0.6 allows remote attackers to cause a denial of service (daemon crash) via an RTP comfort noise payload with a long data length.
References
cve@mitre.orghttp://downloads.asterisk.org/pub/security/AST-2009-010-1.2.diff.txtExploit
cve@mitre.orghttp://downloads.asterisk.org/pub/security/AST-2009-010-1.4.diff.txtExploit
cve@mitre.orghttp://downloads.asterisk.org/pub/security/AST-2009-010-1.6.0.diff.txtExploit
cve@mitre.orghttp://downloads.asterisk.org/pub/security/AST-2009-010-1.6.1.diff.txtExploit
cve@mitre.orghttp://downloads.digium.com/pub/security/AST-2009-010.htmlVendor Advisory
cve@mitre.orghttp://secunia.com/advisories/37530Exploit, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/37677
cve@mitre.orghttp://secunia.com/advisories/37708
cve@mitre.orghttp://securitytracker.com/id?1023249
cve@mitre.orghttp://www.debian.org/security/2009/dsa-1952
cve@mitre.orghttp://www.osvdb.org/60569
cve@mitre.orghttp://www.redhat.com/archives/fedora-package-announce/2009-December/msg00759.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/508147/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/37153
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/3368Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/54471
cve@mitre.orghttps://issues.asterisk.org/view.php?id=16242
af854a3a-2127-422b-91ae-364da2661108http://downloads.asterisk.org/pub/security/AST-2009-010-1.2.diff.txtExploit
af854a3a-2127-422b-91ae-364da2661108http://downloads.asterisk.org/pub/security/AST-2009-010-1.4.diff.txtExploit
af854a3a-2127-422b-91ae-364da2661108http://downloads.asterisk.org/pub/security/AST-2009-010-1.6.0.diff.txtExploit
af854a3a-2127-422b-91ae-364da2661108http://downloads.asterisk.org/pub/security/AST-2009-010-1.6.1.diff.txtExploit
af854a3a-2127-422b-91ae-364da2661108http://downloads.digium.com/pub/security/AST-2009-010.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37530Exploit, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37677
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37708
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1023249
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1952
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/60569
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/archives/fedora-package-announce/2009-December/msg00759.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/508147/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/37153
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/3368Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/54471
af854a3a-2127-422b-91ae-364da2661108https://issues.asterisk.org/view.php?id=16242
Impacted products
Vendor Product Version
digium asterisk 1.2.0
digium asterisk 1.2.0
digium asterisk 1.2.0
digium asterisk 1.2.0
digium asterisk 1.2.0
digium asterisk 1.2.1
digium asterisk 1.2.2
digium asterisk 1.2.2
digium asterisk 1.2.3
digium asterisk 1.2.3
digium asterisk 1.2.10
digium asterisk 1.2.10
digium asterisk 1.2.11
digium asterisk 1.2.11
digium asterisk 1.2.12
digium asterisk 1.2.12
digium asterisk 1.2.12.1
digium asterisk 1.2.12.1
digium asterisk 1.2.13
digium asterisk 1.2.13
digium asterisk 1.2.14
digium asterisk 1.2.15
digium asterisk 1.2.15
digium asterisk 1.2.16
digium asterisk 1.2.16
digium asterisk 1.2.17
digium asterisk 1.2.17
digium asterisk 1.2.18
digium asterisk 1.2.18
digium asterisk 1.2.19
digium asterisk 1.2.19
digium asterisk 1.2.20
digium asterisk 1.2.20
digium asterisk 1.2.21
digium asterisk 1.2.21
digium asterisk 1.2.21.1
digium asterisk 1.2.21.1
digium asterisk 1.2.22
digium asterisk 1.2.22
digium asterisk 1.2.23
digium asterisk 1.2.23
digium asterisk 1.2.24
digium asterisk 1.2.24
digium asterisk 1.2.25
digium asterisk 1.2.25
digium asterisk 1.2.26
digium asterisk 1.2.26
digium asterisk 1.2.26.1
digium asterisk 1.2.26.1
digium asterisk 1.2.26.2
digium asterisk 1.2.26.2
digium asterisk 1.2.27
digium asterisk 1.2.28
digium asterisk 1.2.28.1
digium asterisk 1.2.29
digium asterisk 1.2.30
digium asterisk 1.2.30.1
digium asterisk 1.2.30.2
digium asterisk 1.2.30.3
digium asterisk 1.2.30.4
digium asterisk 1.2.31
digium asterisk 1.2.31.1
digium asterisk 1.2.32
digium asterisk 1.2.33
digium asterisk 1.2.34
digium asterisk 1.2.35
digium asterisk 1.2.36
digium asterisk 1.4.0
digium asterisk 1.4.0
digium asterisk 1.4.0
digium asterisk 1.4.0
digium asterisk 1.4.0
digium asterisk 1.4.1
digium asterisk 1.4.2
digium asterisk 1.4.3
digium asterisk 1.4.4
digium asterisk 1.4.5
digium asterisk 1.4.6
digium asterisk 1.4.7
digium asterisk 1.4.7.1
digium asterisk 1.4.8
digium asterisk 1.4.9
digium asterisk 1.4.10
digium asterisk 1.4.10.1
digium asterisk 1.4.11
digium asterisk 1.4.12
digium asterisk 1.4.12.1
digium asterisk 1.4.13
digium asterisk 1.4.14
digium asterisk 1.4.15
digium asterisk 1.4.16
digium asterisk 1.4.16.1
digium asterisk 1.4.16.2
digium asterisk 1.4.17
digium asterisk 1.4.18
digium asterisk 1.4.19
digium asterisk 1.4.19
digium asterisk 1.4.19
digium asterisk 1.4.19
digium asterisk 1.4.19
digium asterisk 1.4.19.1
digium asterisk 1.4.19.2
digium asterisk 1.4.20
digium asterisk 1.4.20
digium asterisk 1.4.20
digium asterisk 1.4.20
digium asterisk 1.4.20.1
digium asterisk 1.4.21
digium asterisk 1.4.21
digium asterisk 1.4.21
digium asterisk 1.4.21.1
digium asterisk 1.4.21.2
digium asterisk 1.4.22
digium asterisk 1.4.22
digium asterisk 1.4.22
digium asterisk 1.4.22
digium asterisk 1.4.22
digium asterisk 1.4.22
digium asterisk 1.4.22.1
digium asterisk 1.4.22.2
digium asterisk 1.4.23
digium asterisk 1.4.23
digium asterisk 1.4.23
digium asterisk 1.4.23
digium asterisk 1.4.23
digium asterisk 1.4.23.1
digium asterisk 1.4.23.2
digium asterisk 1.4.24
digium asterisk 1.4.24
digium asterisk 1.4.24.1
digium asterisk 1.4.25
digium asterisk 1.4.25
digium asterisk 1.4.25.1
digium asterisk 1.4.26
digium asterisk 1.4.26
digium asterisk 1.4.26
digium asterisk 1.4.26
digium asterisk 1.4.26
digium asterisk 1.4.26
digium asterisk 1.4.26
digium asterisk 1.4.26.1
digium asterisk 1.4.26.2
digium asterisk 1.4.27
digium asterisk 1.4.27
digium asterisk 1.6.0
digium asterisk 1.6.0
digium asterisk 1.6.0
digium asterisk 1.6.0
digium asterisk 1.6.0
digium asterisk 1.6.0
digium asterisk 1.6.0
digium asterisk 1.6.0
digium asterisk 1.6.0
digium asterisk 1.6.0
digium asterisk 1.6.0
digium asterisk 1.6.0
digium asterisk 1.6.0
digium asterisk 1.6.0
digium asterisk 1.6.0.1
digium asterisk 1.6.0.2
digium asterisk 1.6.0.3
digium asterisk 1.6.0.3
digium asterisk 1.6.0.4
digium asterisk 1.6.0.5
digium asterisk 1.6.0.6
digium asterisk 1.6.0.7
digium asterisk 1.6.0.8
digium asterisk 1.6.0.9
digium asterisk 1.6.0.10
digium asterisk 1.6.0.11
digium asterisk 1.6.0.11
digium asterisk 1.6.0.11
digium asterisk 1.6.0.14
digium asterisk 1.6.0.14
digium asterisk 1.6.0.15
digium asterisk 1.6.0.16
digium asterisk 1.6.0.16
digium asterisk 1.6.0.16
digium asterisk 1.6.0.18
digium asterisk 1.6.1.0
digium asterisk 1.6.1.0
digium asterisk 1.6.1.0
digium asterisk 1.6.1.0
digium asterisk 1.6.1.0
digium asterisk 1.6.1.1
digium asterisk 1.6.1.2
digium asterisk 1.6.1.3
digium asterisk 1.6.1.4
digium asterisk 1.6.1.5
digium asterisk 1.6.1.5
digium asterisk 1.6.1.6
digium asterisk 1.6.1.7
digium asterisk 1.6.1.7
digium asterisk 1.6.1.8
digium asterisk 1.6.1.10
digium asterisk 1.6.1.10
digium asterisk 1.6.1.10
digium asterisk 1.6.1.10
digium s800i 1.3.0
digium s800i 1.3.0.2
digium s800i 1.3.0.3
digium s800i 1.3.0.4
digium asterisk b
digium asterisk b.1.3.2
digium asterisk b.1.3.3
digium asterisk b.2.2.0
digium asterisk b.2.2.1
digium asterisk b.2.3.1
digium asterisk b.2.3.2
digium asterisk b.2.3.3
digium asterisk b.2.3.4
digium asterisk b.2.3.5
digium asterisk b.2.3.6
digium asterisk b.2.5.0
digium asterisk b.2.5.1
digium asterisk b.2.5.2
digium asterisk b.2.5.3
digium asterisk c
digium asterisk c.2.3
digium asterisk c.3.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "39358795-09A6-44C6-B969-1560CEF40057",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "8C2DAB51-91ED-43D4-AEA9-7C4661089BAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "A596A018-2FBC-4CEB-9910-756CC6598679",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "14BDCF8E-0B68-430A-A463-EE40C1A9AD65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "CA2CD93E-71A5-49EC-B986-5868C05553EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B66B213-4397-4435-8E48-8ED69AAE13D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "55131A3D-C892-44EC-83D6-5888C57B11A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.2:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "E017DD53-B8EC-4EA2-BF59-18C075C5771D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B940EEC6-4451-42B9-A56D-BDB8801B3685",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.3:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "CE4AB19F-1338-466D-AAD8-584C79FED1AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "175954A5-E712-41B8-BC11-4F999343063D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.10:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "FF5A2AA3-BB1F-4DEA-A369-183877BBDAC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DF9E41E-8FE6-4396-A5D4-D4568600FE03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.11:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "7B43C508-91E3-49C9-86F0-3643D8F2B7F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "4457486F-E9B4-46B8-A05D-3B32F8B639A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.12:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "0831E658-36AB-4A4B-9929-3DB6BE855A3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "69417F54-D92F-46FB-9BFA-995211279C0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.12.1:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "46A770C7-A7D4-44E3-A8B4-AC2189EAC3DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "4611BEA0-25EC-4705-A390-6DF678373FF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.13:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "4BCD1F97-4B56-4DA8-A6EC-FA42A3CB9B97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "53022458-F443-4402-AC52-FC3AE810E89E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "120B85AA-E9B8-4A4D-81CE-FD36CDB63074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.15:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "64D94742-7CA1-487B-90E8-5063FBF88925",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "12302460-5D3F-4045-9DBF-606562E03BDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.16:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "78546FDF-C843-4E48-ABEE-CC3514AA7C3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D6EBC0B-9842-44D1-B9D6-EFB88BE22879",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.17:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "052969F1-6758-46E8-9273-E0F872BD65BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "624A0F00-4629-4550-847F-F24CC93DFF2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.18:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "E473F645-F8B0-43FE-957B-F053427465DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "10FC9AAB-1FAD-4953-A2FC-D42E9687D27E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.19:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "460C9907-AA19-402A-85DE-D3CEA98B107B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD80F0D6-6B5B-41D3-AC41-F1643865088A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.20:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "734D5198-53C1-40D3-B5BF-D74FC71FD3BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "788DEF5E-8A99-463D-89DC-0CC032271554",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.21:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "C0996D7A-9419-4897-A0AF-498AC3A2A81F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.21.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "62D670E6-47E5-4B40-9217-F97D5F39C3EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.21.1:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "94C23DB8-3C92-40FE-B8A6-ADF84D28510E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6CE7E4E-DA2D-4F03-A226-92965B40AE34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.22:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "0C59A947-457E-47EB-832E-3DA70CB52695",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "55F74B56-B412-4AF1-AED0-C948AB6DC829",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.23:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "3B50ADDB-D3C2-407D-8844-F93866E5F20C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "2775A7CC-2D88-4F2D-8C26-1E0DDDD681E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.24:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "F4149B59-E773-4ED8-A71D-EB7D00808819",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A0408C3-0FA7-4A17-9451-C4D46CDA8F27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.25:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "1726090D-0C37-44A4-AD9B-7ED733B8702D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "B92B045B-8CD6-4C04-9CCB-DCE9A44F6C12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.26:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "54354E16-3238-43E8-BAA9-93CA7EB44D4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.26.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6867EED4-FC3B-4B72-88A5-DED96C729FE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.26.1:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "1A0867FC-7161-433F-A416-D7207C8D4D36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.26.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "97BE6B60-3276-4580-843B-743D0D71E3DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.26.2:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "36491B32-A405-4C5B-938F-9BEA50A8AF16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "6141909B-EBC4-4726-AE9F-669C31257A5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "754A51AC-EF20-4736-ADDB-D2A70BCB79EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.28.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4600BB66-6DEB-444B-AF9E-BDD06CFD2876",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE089E31-3521-4D12-B81C-B6E386AE1409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFE86E95-1110-46DF-9A7A-0E1AA56ACE4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.30.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B6DF5C5-85B4-4595-A69B-1DE70B5E0E41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.30.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F5E9888-16CD-4DB2-8889-CE4477559C71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.30.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C29C9A2C-6435-444E-A20B-5881F3798B85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.30.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E77A2569-CFAE-498D-A633-803849CFECE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "D16E88E6-42D0-400E-AF43-111B35CE11E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.31.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE15A42E-030B-48F0-9498-1755DAAEDFB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "39511726-1202-4179-9708-4D3B28496768",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A9A4328-F274-4591-A386-943FD6608374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B4A8C9A-A475-4F02-A6BC-F17CEECBF0AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF11B38A-12D7-453A-870D-CDC2DE9313CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D69ACB7-CF9A-40B5-819E-58DA884D4E1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E56DB29-571D-4615-B347-38CF4590E463",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "FC1188DA-6C27-48D2-9CE7-74D77B24EE9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "A93B8F91-5C56-44DE-AE29-8468E853759F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "BF7F4D02-7C8E-403C-A53E-A5F8C07F33A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D85031A3-3444-4650-905D-721F1EBAA24F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F0AC2B3-6E8A-4B26-8A6C-792D9E5072C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BC8D6D4-A389-4A78-8DA8-351A9CB896E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E979AC4-58EA-4297-9F90-350924BBE440",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A58CCD3-4A0C-468B-85F2-59A52B7293A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3542DB91-8487-49D6-AA15-E8FD9D6B99D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BA4F3F1-C3F1-4E15-A854-9BB84E33E4AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "661D710E-79F0-4E98-B35B-ED0549D35C24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "68291ADE-F9D1-427B-B150-FDA7F2F4788B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F80CBCB-F58D-4BE7-8E78-67E04C900D01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB61D32E-3400-480E-BD27-BA3F98F94427",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9154EDB-CAE6-4BB0-8D02-9EC2B81D93C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A432B0A7-F158-4B9C-97F6-6A29DB13EAFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "687C67CB-46AF-40C2-8A02-081C7F78568A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E8D6EC0-A61E-4DBC-A0C7-864E9C4BDA1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EF7F65A-45FD-4586-901E-49B057100BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "300F158E-ED27-46C8-85E4-AA0AA6B201DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB6F04C0-3226-4D2C-97A3-39999483C62C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "30685A20-963A-48D4-B7D7-2C11C2C812AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C54C3AAC-4D5D-4661-86AB-6849982E8C67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.16.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F847916-89F1-4AA6-973D-6002C8B54EE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.16.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5359815E-671A-4DFD-9E99-8CF903A03C84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2EFBC9E-4DCA-43CB-93EB-6807E2383A98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "98755B1B-CAD5-4AC5-8571-52E67C3A8274",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9D8C8FE-3D09-4F60-AD03-9D4439942141",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "902FBE4B-5237-43CD-8EB6-D2CAC0F30879",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "708DCACA-49EC-468D-81EC-CE5367F8A164",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "BA9E3314-7D23-414C-8187-16D807410B62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "D824ED7B-BAB6-4C0F-A6B0-A75AB072EC0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.19.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A01CE63-F834-48B2-826D-2DAD1B4AE8C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.19.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "88B9CC9D-3DC2-4674-BA52-4C6D4E2056C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "43F1849F-1230-45E7-B6A3-D6FC72EB0F11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "873C9C7E-93A3-4269-B19C-AB33A21C1AC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "457F2112-7C5E-4953-8F4C-117925D486DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "BD15ADD6-D7FA-441A-A9BC-487BCC15F2A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.20.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "792A8901-B7B8-40E8-9258-6338B72770FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E6C8F78-0C00-45A5-8FEB-2A4BD5AC1A37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F3E04247-C4EF-4C1B-B879-5C02986950D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "5E382FC8-4001-4058-9151-05AE98B4A35E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.21.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "11FECE6B-B6A6-4DDA-9019-9A10B05EC1F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.21.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9813D27-0688-4989-99EB-1DC0F82D59F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4333904-9D21-4149-965F-F49F0A34BD85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F7180626-F0FD-46F3-AD52-5C67525C4B46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "85A1E3A3-C157-4F3D-9477-F63771E7F627",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "FEE739CC-7A9C-489E-BFC0-6257129C043D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "ADC0E947-A95A-44ED-8DED-CC769FF00569",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "DE52BD9F-3728-455C-BC45-1A4DB926FFE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.22.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF82D41-9222-42D3-ADAD-94B4F950C63F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.22.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AE9F181-A8E4-4700-A30F-211CDE251606",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B10AE4B-EC2D-4D5B-B842-50F5097A0650",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "83E854D0-17A2-473B-B7E8-41E6447C81DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "47169133-3854-4D8F-B79E-3CC77A166EF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "6071601F-CF37-4E66-9D6D-AFC3434C18AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "2A575824-E005-4820-824A-4875594619E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.23.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "080C7089-5662-4A94-9842-C4A26095DA4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.23.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AE38697-0B16-4032-9234-CA263E4A9885",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCB18BE2-B073-429C-ABE7-B8305793DAE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.24:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FA7216BA-A42F-4ED8-8086-B4FA483FDAB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.24.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB7D2048-CD61-46C0-830B-11976B275783",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DBA63FE-62AF-4F3D-B30C-550D17C4E35F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.25:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "AD0A0F19-020D-4578-9023-12B0CB646D9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.25.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D5A1E3-FF0B-4C71-AA51-655D7106880D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5D425E6-E2E5-4452-9EAA-2697C1155784",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "9855FA26-0930-4AC9-A920-B394F6916349",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "BBA21246-7DF4-41BC-998A-05D38FC97C8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "EE9A7984-22C9-4296-8E44-C010E67F193D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "51B2C42A-C252-4BD8-A908-8F30C2BF15E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "2137CEAD-0F19-43C5-A26D-1972564FCD8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "B7552466-B782-4F16-8561-A2A51E94FED4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.26.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2F8C82D-3031-4C62-89FA-3BF56EA29727",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.26.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3074CEA-46BD-4CAD-BF5C-10008A80E434",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "E06848DE-6EE1-4FD0-A14F-39D41B2F3E75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "88FBC328-538A-4484-A342-1688D9669B9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8374B5D-DE7A-4C3C-A5FE-579B17006A54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "C7494CE2-D3CC-404D-BE61-09A2E1FB3E47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "06E48482-D9AF-4038-80DA-27D9B4907C0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "9BC3C441-290F-471A-BA19-6B1C4D72A670",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "632ED295-B67D-43CF-BF38-CCE04088BA08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "50F3835F-6F2B-4EA7-B111-3B3C26548BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7BD2-7903-4DC5-ADDC-EFCDC58736C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "E5BECFE0-286F-4DA1-8CA9-6CEE861C3012",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta7.1:*:*:*:*:*:*",
              "matchCriteriaId": "AFFF3245-2D0F-46E3-A1D6-319086489DC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "C91F2524-99D1-4C4B-9A31-21C0FB8B4D5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta9:*:*:*:*:*:*",
              "matchCriteriaId": "7B1BC0FF-9DB6-4FCC-A845-053943CF0D24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "419D4D16-E790-4872-B9AF-1320978768C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "73D30BA6-1EE0-4C3F-8F69-65C698A1B9A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "D39FA25D-AB56-470D-94AB-14446DB7D475",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4225252F-5960-4A42-A575-00C125860E89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A65D76A8-BBDD-4BDE-B789-D745C400DCBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8B0F5A5-4252-4A9C-B830-2419E87AE5A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F9085056-3BE9-4309-9601-9CA0569BC215",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D8432455-9064-479F-B060-BF2A74ECC3EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E8EF2D7-371B-4268-989E-25225CC1F7B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABAC4CE9-1CFA-4279-B0CE-18F3C6FB9AB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E16E37A0-F739-4EEE-A1BB-EBC558C62767",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0E2562-D0FC-404C-B725-617AEEF20AB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "C831EC2A-C99D-4FB1-8E5C-2FF685792F2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "F37C4158-6C4E-448D-929B-288480748289",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BBA9D27-E3DC-45CE-B56B-2C6781AA6A16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.11:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "14CD1CCD-DFF2-4813-B56F-EA1C78AA818E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.11:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "4499411B-C92E-47F3-A6F2-8C9011B1CBCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "57325096-F4D8-4146-A6FD-93219F2C72D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.14:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "9684FD88-7422-4272-B9BC-D8638B1AA0B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "648639A2-26C4-4EDA-A982-25D400836696",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F9F6FF8-8B88-4A02-B23A-0CADA8CE316E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.16:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "37DE011D-1C1B-46AC-9265-F82693CE3C9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.16:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "790BF14A-0193-4A5C-802B-D82200B22342",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "15C4C10F-BD36-491A-87E7-2F072796DA33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8FE4BCF-9AE7-4F41-BA84-E9537CC1EBE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "F25B0D15-7C09-4BBB-AC84-A1898F448DB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "F259057F-3720-45D8-91B4-70A11B759794",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "A106C460-4CE2-4AC3-B2FD-310F05507511",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "3E119FF9-2AD3-450D-8BBF-C6DD063246EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "759221D5-FC37-446D-9628-233B8D0B9120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F82D4812-0429-42D4-BD27-C76CB9E7C368",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F8FE11D6-8C0A-450E-B6DA-3AFE04D82232",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1FBCC8-4637-4A67-BFFD-C052C3C03C12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7307E10-9FA5-4940-B837-7936384F61DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "3D0DC9D6-D4D6-46CB-98DA-F4FC1835B6B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBBD0747-F3FF-46D8-A3C4-8268E37BC5AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "3F759F27-008E-47FB-AC0A-EF11DA19918E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D15C82BA-BD1F-4A19-A907-E6C30042F537",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E802481-C8BD-4218-8CDC-5DB112DA946C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "93C020CD-D0EA-4B3E-B33C-F900B08B28FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0004AADE-1652-4242-A97D-E9818FE03CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "543E9C91-60FE-43AE-9B94-08DD730BA814",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "252849FA-F46E-4F5A-A488-AA53574CA884",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:digium:s800i:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "565444DE-F67C-4B6E-AC1E-92FC0D8A87CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:digium:s800i:1.3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "80E356B2-4AEA-4532-A6F8-13B814BEB2C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:digium:s800i:1.3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60F261AB-3172-4245-8090-744294A0D08A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:digium:s800i:1.3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3DD6B08-D77D-4275-8F91-2CA47FF6E363",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:digium:asterisk:b:-:business:*:*:*:*:*",
              "matchCriteriaId": "564A4529-997D-4615-BED8-AE3FB159689A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:b.1.3.2:-:business:*:*:*:*:*",
              "matchCriteriaId": "FE9D66C4-F49D-4EC4-B5A9-24F28726A9B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:b.1.3.3:-:business:*:*:*:*:*",
              "matchCriteriaId": "BEFA5054-D5F9-4D07-9A66-D7AAD6953F5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:b.2.2.0:-:business:*:*:*:*:*",
              "matchCriteriaId": "D110DCEB-F2F9-4600-B49F-22952C71B785",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:b.2.2.1:-:business:*:*:*:*:*",
              "matchCriteriaId": "3333A119-D92F-433C-BF5D-0037199256C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:b.2.3.1:-:business:*:*:*:*:*",
              "matchCriteriaId": "19C44C33-EADA-48FD-A634-8066A003AFD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:b.2.3.2:-:business:*:*:*:*:*",
              "matchCriteriaId": "294A2BA2-26EB-40AD-B861-7FA9043CD097",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:b.2.3.3:-:business:*:*:*:*:*",
              "matchCriteriaId": "4FAC61AF-BDF2-4397-A8F8-9D9155836E4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:b.2.3.4:-:business:*:*:*:*:*",
              "matchCriteriaId": "33DE61C2-8C6A-4CD3-8D56-E70C4356CD50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:b.2.3.5:-:business:*:*:*:*:*",
              "matchCriteriaId": "EECB5F75-BCE2-4777-933E-25EB5657750C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:b.2.3.6:-:business:*:*:*:*:*",
              "matchCriteriaId": "B5D51557-3E67-4C9A-9753-472D13FCA5C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:b.2.5.0:-:business:*:*:*:*:*",
              "matchCriteriaId": "C063FCFA-B1C3-4ACB-B9E7-B3FC973FD898",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:b.2.5.1:-:business:*:*:*:*:*",
              "matchCriteriaId": "761DB3A3-1540-4976-AEB2-F8E45CCCC5E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:b.2.5.2:-:business:*:*:*:*:*",
              "matchCriteriaId": "B53CD2C1-9BF0-42F9-B3E3-2C9915E531C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:b.2.5.3:-:business:*:*:*:*:*",
              "matchCriteriaId": "947F58B8-21AF-460B-8203-D2605A1F91D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:c:-:business:*:*:*:*:*",
              "matchCriteriaId": "7CD989BE-8FA0-4EDB-8442-C2E12BD01D27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:c.2.3:-:business:*:*:*:*:*",
              "matchCriteriaId": "3FA908BA-BEF8-44A5-AC95-E7CF020D0C94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:c.3.0:-:business:*:*:*:*:*",
              "matchCriteriaId": "78E8936C-033B-49E6-BB39-D5BBBC80EB55",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "rtp.c in Asterisk Open Source 1.2.x before 1.2.37, 1.4.x before 1.4.27.1, 1.6.0.x before 1.6.0.19, and 1.6.1.x before 1.6.1.11; Business Edition B.x.x before B.2.5.13, C.2.x.x before C.2.4.6, and C.3.x.x before C.3.2.3; and s800i 1.3.x before 1.3.0.6 allows remote attackers to cause a denial of service (daemon crash) via an RTP comfort noise payload with a long data length."
    },
    {
      "lang": "es",
      "value": "rtp.c en Asterisk Open Source v1.2.x anterior a v1.2.37, v1.4.x anterior a v1.4.27.1, v1.6.0.x anterior a v1.6.0.19, y v1.6.1.x anterior a v1.6.1.11; Business Edition B.x.x anterior a B.2.5.13, C.2.x.x anterior a C.2.4.6, y C.3.x.x anterior a C.3.2.3; y s800i v1.3.x anterior a v1.3.0.6 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio) a trav\u00e9s una carga \u00fatil del RTP ruido de confort con una larga longitud de datos."
    }
  ],
  "id": "CVE-2009-4055",
  "lastModified": "2024-11-21T01:08:49.793",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-12-02T11:30:00.517",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.2.diff.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.4.diff.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.6.0.diff.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.6.1.diff.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://downloads.digium.com/pub/security/AST-2009-010.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37530"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/37677"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/37708"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1023249"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2009/dsa-1952"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/60569"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/archives/fedora-package-announce/2009-December/msg00759.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/508147/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/37153"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3368"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54471"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://issues.asterisk.org/view.php?id=16242"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.2.diff.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.4.diff.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.6.0.diff.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.6.1.diff.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://downloads.digium.com/pub/security/AST-2009-010.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37530"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/37677"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/37708"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1023249"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2009/dsa-1952"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/60569"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/archives/fedora-package-announce/2009-December/msg00759.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/508147/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/37153"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3368"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54471"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.asterisk.org/view.php?id=16242"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-08-12 10:30
Modified
2024-11-21 01:05
Severity ?
Summary
The SIP channel driver in Asterisk Open Source 1.2.x before 1.2.34, 1.4.x before 1.4.26.1, 1.6.0.x before 1.6.0.12, and 1.6.1.x before 1.6.1.4; Asterisk Business Edition A.x.x, B.x.x before B.2.5.9, C.2.x before C.2.4.1, and C.3.x before C.3.1; and Asterisk Appliance s800i 1.2.x before 1.3.0.3 does not use a maximum width when invoking sscanf style functions, which allows remote attackers to cause a denial of service (stack memory consumption) via SIP packets containing large sequences of ASCII decimal characters, as demonstrated via vectors related to (1) the CSeq value in a SIP header, (2) large Content-Length value, and (3) SDP.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:digium:asterisk:*:*:business:*:*:*:*:*",
              "matchCriteriaId": "C7DBF0A2-9606-43EF-88E6-905B4864D377",
              "versionEndExcluding": "b.2.5.9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:*:*:business:*:*:*:*:*",
              "matchCriteriaId": "945FA0F6-42A8-4AF4-9EF6-4B16D08B2724",
              "versionEndIncluding": "c.2.4.1",
              "versionStartIncluding": "c.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:*:*:business:*:*:*:*:*",
              "matchCriteriaId": "7375080A-38B8-4230-875B-FC6184F23792",
              "versionEndExcluding": "c.3.1",
              "versionStartIncluding": "c.3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:digium:s800i_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E7FEE3E-B19C-4E7E-92D6-D0032A5DAA59",
              "versionEndExcluding": "1.3.0.3",
              "versionStartIncluding": "1.2.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:digium:s800i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15C35F93-0E57-4AEB-AA5F-4EDFAE753451",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "86564062-C367-4652-820A-7B4700011463",
              "versionEndExcluding": "1.2.34",
              "versionStartIncluding": "1.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CD3CE8A-7145-4501-A61A-D29F575E8795",
              "versionEndExcluding": "1.4.26.1",
              "versionStartIncluding": "1.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E6BB86F-2FC7-4830-AC2E-4F114D87FE4C",
              "versionEndExcluding": "1.6.0.12",
              "versionStartIncluding": "1.6.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4DBF98F-EF1D-4DC0-93FE-2EC280AAA5EF",
              "versionEndExcluding": "1.6.1.4",
              "versionStartIncluding": "1.6.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SIP channel driver in Asterisk Open Source 1.2.x before 1.2.34, 1.4.x before 1.4.26.1, 1.6.0.x before 1.6.0.12, and 1.6.1.x before 1.6.1.4; Asterisk Business Edition A.x.x, B.x.x before B.2.5.9, C.2.x before C.2.4.1, and C.3.x before C.3.1; and Asterisk Appliance s800i 1.2.x before 1.3.0.3 does not use a maximum width when invoking sscanf style functions, which allows remote attackers to cause a denial of service (stack memory consumption) via SIP packets containing large sequences of ASCII decimal characters, as demonstrated via vectors related to (1) the CSeq value in a SIP header, (2) large Content-Length value, and (3) SDP."
    },
    {
      "lang": "es",
      "value": "El driver SIP channel en Asterisk Open Source v1.2.x anterior a v1.2.34, v1.4.x anterior a v1.4.26.1, v1.6.0.x anterior a v1.6.0.12, y v1.6.1.x anterior a v1.6.1.4; Asterisk Business Edition vA.x.x, vB.x.x anterior a vB.2.5.9, vC.2.x anterior a vC.2.4.1, y vC.3.x anterior a vC.3.1; y Asterisk Appliance s800i v1.2.x anterior a v1.3.0.3, no utiliza el ancho m\u00e1ximo cuando se invocan las funciones de estilo sscanf, lo que permite a atacantes remotos producir una denegaci\u00f3n de servicio (agotamiento de la pila de memoria) a trav\u00e9s de paquetes SIP que contienen secuencias largas de caracteres ASCII decimales, como se demostr\u00f3 a trav\u00e9s de vectores relacionados con (1) el valor CSeq en una cabecera SIP, (2) valores  Content-Length, y (3) SDP."
    }
  ],
  "id": "CVE-2009-2726",
  "lastModified": "2024-11-21T01:05:36.590",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-08-12T10:30:01.110",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Product"
      ],
      "url": "http://downloads.digium.com/pub/security/AST-2009-005.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://labs.mudynamics.com/advisories/MU-200908-01.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36227"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/505669/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/36015"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1022705"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/2229"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Product"
      ],
      "url": "http://downloads.digium.com/pub/security/AST-2009-005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://labs.mudynamics.com/advisories/MU-200908-01.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36227"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/505669/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/36015"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1022705"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/2229"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-770"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-01-20 19:00
Modified
2024-11-21 01:24
Severity ?
Summary
Stack-based buffer overflow in the ast_uri_encode function in main/utils.c in Asterisk Open Source before 1.4.38.1, 1.4.39.1, 1.6.1.21, 1.6.2.15.1, 1.6.2.16.1, 1.8.1.2, 1.8.2.; and Business Edition before C.3.6.2; when running in pedantic mode allows remote authenticated users to execute arbitrary code via crafted caller ID data in vectors involving the (1) SIP channel driver, (2) URIENCODE dialplan function, or (3) AGI dialplan function.
References
cve@mitre.orghttp://downloads.asterisk.org/pub/security/AST-2011-001-1.6.2.diffPatch, Vendor Advisory
cve@mitre.orghttp://downloads.asterisk.org/pub/security/AST-2011-001.htmlVendor Advisory
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2011-February/053689.htmlThird Party Advisory
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2011-February/053713.htmlThird Party Advisory
cve@mitre.orghttp://osvdb.org/70518Broken Link
cve@mitre.orghttp://secunia.com/advisories/42935Third Party Advisory
cve@mitre.orghttp://secunia.com/advisories/43119Third Party Advisory
cve@mitre.orghttp://secunia.com/advisories/43373Third Party Advisory
cve@mitre.orghttp://www.debian.org/security/2011/dsa-2171Third Party Advisory
cve@mitre.orghttp://www.securityfocus.com/archive/1/515781/100/0/threadedThird Party Advisory, VDB Entry
cve@mitre.orghttp://www.securityfocus.com/bid/45839Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0159Permissions Required
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0281Permissions Required
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0449Permissions Required
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/64831Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://downloads.asterisk.org/pub/security/AST-2011-001-1.6.2.diffPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://downloads.asterisk.org/pub/security/AST-2011-001.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053689.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053713.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/70518Broken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42935Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43119Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43373Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2171Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/515781/100/0/threadedThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/45839Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0159Permissions Required
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0281Permissions Required
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0449Permissions Required
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/64831Third Party Advisory, VDB Entry



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:business:*:*:*",
              "matchCriteriaId": "FA6C77B1-85FF-47C1-8E1F-CABFF1DEA5FE",
              "versionEndExcluding": "c.3.6.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CF68F51-2011-4CEE-A4EA-49A59E440BAA",
              "versionEndIncluding": "1.2.40",
              "versionStartIncluding": "1.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0CCB255-0F1A-4FBE-A04D-A9560D3DF3BE",
              "versionEndExcluding": "1.4.38.1",
              "versionStartIncluding": "1.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3CEB89D-1D84-4B8E-B476-E00726752766",
              "versionEndExcluding": "1.4.39.1",
              "versionStartIncluding": "1.4.39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0F92DAC-5736-49A6-9C52-2330BC4B724B",
              "versionEndExcluding": "1.6.1.21",
              "versionStartIncluding": "1.6.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "71755241-9AF8-43EE-BD9F-9FF4DFD808D4",
              "versionEndExcluding": "1.6.2.15.1",
              "versionStartIncluding": "1.6.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "007C363A-CBC6-4A05-BD3E-74A5A530B281",
              "versionEndExcluding": "1.6.2.16.1",
              "versionStartIncluding": "1.6.2.16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "35488043-2E09-4286-A178-4A25AA5C364F",
              "versionEndExcluding": "1.8.1.2",
              "versionStartIncluding": "1.8.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AADFA817-D1C7-49D2-AE6D-55493145BAFF",
              "versionEndExcluding": "1.8.2.2",
              "versionStartIncluding": "1.8.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisknow:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF81215F-0DD3-48FC-BA1C-19E42FCD47B5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2D59BD0-43DE-4E58-A057-640AB98359A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDE52846-24EC-4068-B788-EC7F915FFF11",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:digium:s800i_firmware:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AA18EB6-92D5-4B01-A4BC-2B7177D28C40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:digium:s800i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15C35F93-0E57-4AEB-AA5F-4EDFAE753451",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the ast_uri_encode function in main/utils.c in Asterisk Open Source before 1.4.38.1, 1.4.39.1, 1.6.1.21, 1.6.2.15.1, 1.6.2.16.1, 1.8.1.2, 1.8.2.; and Business Edition before C.3.6.2; when running in pedantic mode allows remote authenticated users to execute arbitrary code via crafted caller ID data in vectors involving the (1) SIP channel driver, (2) URIENCODE dialplan function, or (3) AGI dialplan function."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en la funci\u00f3n ast_uri_encode, en main/utils.c, en Asterisk Open Source before v.1.4.38.1, v.1.4.39.1, v.1.6.1.21, v.1.6.2.15.1, v.1.6.2.16.1, v.1.8.1.2, v.1.8.2.; y Business Edition before v.C.3.6.2; cuando se ejecuta en modo \"pedantic\" permite a usuarios autenticados ejectuar c\u00f3digo de su elecci\u00f3n manipulados con el dato llamador ID en vectores que involucran el (1) el driver del SIP, (2) la funci\u00f3n URIENCODE dialplan, o la funci\u00f3n AGI dialplan."
    }
  ],
  "id": "CVE-2011-0495",
  "lastModified": "2024-11-21T01:24:08.320",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-01-20T19:00:08.600",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://downloads.asterisk.org/pub/security/AST-2011-001-1.6.2.diff"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://downloads.asterisk.org/pub/security/AST-2011-001.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053689.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053713.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://osvdb.org/70518"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/42935"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/43119"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/43373"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2011/dsa-2171"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/515781/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/45839"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0159"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0281"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0449"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64831"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://downloads.asterisk.org/pub/security/AST-2011-001-1.6.2.diff"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://downloads.asterisk.org/pub/security/AST-2011-001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053689.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053713.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://osvdb.org/70518"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/42935"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/43119"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/43373"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2011/dsa-2171"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/515781/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/45839"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0159"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0281"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0449"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64831"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-11-10 18:30
Modified
2024-11-21 01:08
Severity ?
Summary
Asterisk Open Source 1.2.x before 1.2.35, 1.4.x before 1.4.26.3, 1.6.0.x before 1.6.0.17, and 1.6.1.x before 1.6.1.9; Business Edition A.x.x, B.x.x before B.2.5.12, C.2.x.x before C.2.4.5, and C.3.x.x before C.3.2.2; AsteriskNOW 1.5; and s800i 1.3.x before 1.3.0.5 generate different error messages depending on whether a SIP username is valid, which allows remote attackers to enumerate valid usernames via multiple crafted REGISTER messages with inconsistent usernames in the URI in the To header and the Digest in the Authorization header.
References
secalert@redhat.comhttp://downloads.asterisk.org/pub/security/AST-2009-008.htmlVendor Advisory
secalert@redhat.comhttp://osvdb.org/59697
secalert@redhat.comhttp://secunia.com/advisories/37265Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/37479
secalert@redhat.comhttp://secunia.com/advisories/37677
secalert@redhat.comhttp://www.debian.org/security/2009/dsa-1952
secalert@redhat.comhttp://www.securityfocus.com/bid/36924Patch
secalert@redhat.comhttp://www.securitytracker.com/id?1023133
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=523277
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=533137
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2009-November/msg00789.html
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2009-November/msg00838.html
af854a3a-2127-422b-91ae-364da2661108http://downloads.asterisk.org/pub/security/AST-2009-008.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/59697
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37265Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37479
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37677
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1952
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/36924Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1023133
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=523277
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=533137
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00789.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00838.html
Impacted products
Vendor Product Version
digium asterisk 1.2.0
digium asterisk 1.2.0
digium asterisk 1.2.0
digium asterisk 1.2.0
digium asterisk 1.2.0
digium asterisk 1.2.1
digium asterisk 1.2.2
digium asterisk 1.2.2
digium asterisk 1.2.3
digium asterisk 1.2.3
digium asterisk 1.2.10
digium asterisk 1.2.10
digium asterisk 1.2.11
digium asterisk 1.2.11
digium asterisk 1.2.12
digium asterisk 1.2.12
digium asterisk 1.2.12.1
digium asterisk 1.2.12.1
digium asterisk 1.2.13
digium asterisk 1.2.13
digium asterisk 1.2.14
digium asterisk 1.2.15
digium asterisk 1.2.15
digium asterisk 1.2.16
digium asterisk 1.2.16
digium asterisk 1.2.17
digium asterisk 1.2.17
digium asterisk 1.2.18
digium asterisk 1.2.18
digium asterisk 1.2.19
digium asterisk 1.2.19
digium asterisk 1.2.20
digium asterisk 1.2.20
digium asterisk 1.2.21
digium asterisk 1.2.21
digium asterisk 1.2.21.1
digium asterisk 1.2.21.1
digium asterisk 1.2.22
digium asterisk 1.2.22
digium asterisk 1.2.23
digium asterisk 1.2.23
digium asterisk 1.2.24
digium asterisk 1.2.24
digium asterisk 1.2.25
digium asterisk 1.2.25
digium asterisk 1.2.26
digium asterisk 1.2.26
digium asterisk 1.2.26.1
digium asterisk 1.2.26.1
digium asterisk 1.2.26.2
digium asterisk 1.2.26.2
digium asterisk 1.2.27
digium asterisk 1.2.28
digium asterisk 1.2.28.1
digium asterisk 1.2.29
digium asterisk 1.2.30
digium asterisk 1.2.30.1
digium asterisk 1.2.30.2
digium asterisk 1.2.30.3
digium asterisk 1.2.30.4
digium asterisk 1.2.31
digium asterisk 1.2.31.1
digium asterisk 1.2.32
digium asterisk 1.2.33
digium asterisk 1.2.34
digium asterisk 1.4.0
digium asterisk 1.4.0
digium asterisk 1.4.0
digium asterisk 1.4.0
digium asterisk 1.4.0
digium asterisk 1.4.1
digium asterisk 1.4.2
digium asterisk 1.4.3
digium asterisk 1.4.4
digium asterisk 1.4.5
digium asterisk 1.4.6
digium asterisk 1.4.7
digium asterisk 1.4.7.1
digium asterisk 1.4.8
digium asterisk 1.4.9
digium asterisk 1.4.10
digium asterisk 1.4.10.1
digium asterisk 1.4.11
digium asterisk 1.4.12
digium asterisk 1.4.12.1
digium asterisk 1.4.13
digium asterisk 1.4.14
digium asterisk 1.4.15
digium asterisk 1.4.16
digium asterisk 1.4.16.1
digium asterisk 1.4.16.2
digium asterisk 1.4.17
digium asterisk 1.4.18
digium asterisk 1.4.19
digium asterisk 1.4.19
digium asterisk 1.4.19
digium asterisk 1.4.19
digium asterisk 1.4.19
digium asterisk 1.4.19.1
digium asterisk 1.4.19.2
digium asterisk 1.4.20
digium asterisk 1.4.20
digium asterisk 1.4.20
digium asterisk 1.4.20
digium asterisk 1.4.20.1
digium asterisk 1.4.21
digium asterisk 1.4.21
digium asterisk 1.4.21
digium asterisk 1.4.21.1
digium asterisk 1.4.21.2
digium asterisk 1.4.22
digium asterisk 1.4.22
digium asterisk 1.4.22
digium asterisk 1.4.22
digium asterisk 1.4.22
digium asterisk 1.4.22
digium asterisk 1.4.22.1
digium asterisk 1.4.22.2
digium asterisk 1.4.23
digium asterisk 1.4.23
digium asterisk 1.4.23
digium asterisk 1.4.23
digium asterisk 1.4.23
digium asterisk 1.4.23.1
digium asterisk 1.4.23.2
digium asterisk 1.4.24
digium asterisk 1.4.24
digium asterisk 1.4.24.1
digium asterisk 1.4.25
digium asterisk 1.4.25
digium asterisk 1.4.25.1
digium asterisk 1.4.26
digium asterisk 1.4.26
digium asterisk 1.4.26
digium asterisk 1.4.26
digium asterisk 1.4.26
digium asterisk 1.4.26
digium asterisk 1.4.26
digium asterisk 1.4.26.1
digium asterisk 1.4.26.2
digium asterisk 1.6.0
digium asterisk 1.6.0
digium asterisk 1.6.0
digium asterisk 1.6.0
digium asterisk 1.6.0
digium asterisk 1.6.0
digium asterisk 1.6.0
digium asterisk 1.6.0
digium asterisk 1.6.0
digium asterisk 1.6.0
digium asterisk 1.6.0
digium asterisk 1.6.0
digium asterisk 1.6.0
digium asterisk 1.6.0
digium asterisk 1.6.0.1
digium asterisk 1.6.0.2
digium asterisk 1.6.0.3
digium asterisk 1.6.0.3
digium asterisk 1.6.0.4
digium asterisk 1.6.0.5
digium asterisk 1.6.0.6
digium asterisk 1.6.0.7
digium asterisk 1.6.0.8
digium asterisk 1.6.0.9
digium asterisk 1.6.0.10
digium asterisk 1.6.0.11
digium asterisk 1.6.0.11
digium asterisk 1.6.0.11
digium asterisk 1.6.0.14
digium asterisk 1.6.0.14
digium asterisk 1.6.0.15
digium asterisk 1.6.0.16
digium asterisk 1.6.0.16
digium asterisk 1.6.0.16
digium asterisk 1.6.1.0
digium asterisk 1.6.1.0
digium asterisk 1.6.1.0
digium asterisk 1.6.1.0
digium asterisk 1.6.1.0
digium asterisk 1.6.1.1
digium asterisk 1.6.1.2
digium asterisk 1.6.1.3
digium asterisk 1.6.1.4
digium asterisk 1.6.1.5
digium asterisk 1.6.1.5
digium asterisk 1.6.1.6
digium asterisk 1.6.1.7
digium asterisk 1.6.1.7
digium asterisk 1.6.1.8
digium asterisk 1.6.1.10
digium asterisk 1.6.1.10
digium asterisknow 1.5
digium s800i 1.3.0
digium s800i 1.3.0.2
digium s800i 1.3.0.3
digium s800i 1.3.0.4
digium asterisk a
digium asterisk b
digium asterisk b.1.3.2
digium asterisk b.1.3.3
digium asterisk b.2.2.0
digium asterisk b.2.2.1
digium asterisk b.2.3.1
digium asterisk b.2.3.2
digium asterisk b.2.3.3
digium asterisk b.2.3.4
digium asterisk b.2.3.5
digium asterisk b.2.3.6
digium asterisk b.2.5.0
digium asterisk b.2.5.1
digium asterisk b.2.5.2
digium asterisk b.2.5.3
digium asterisk c
digium asterisk c.2.3
digium asterisk c.3.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "39358795-09A6-44C6-B969-1560CEF40057",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "8C2DAB51-91ED-43D4-AEA9-7C4661089BAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "A596A018-2FBC-4CEB-9910-756CC6598679",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "14BDCF8E-0B68-430A-A463-EE40C1A9AD65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "CA2CD93E-71A5-49EC-B986-5868C05553EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B66B213-4397-4435-8E48-8ED69AAE13D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "55131A3D-C892-44EC-83D6-5888C57B11A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.2:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "E017DD53-B8EC-4EA2-BF59-18C075C5771D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B940EEC6-4451-42B9-A56D-BDB8801B3685",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.3:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "CE4AB19F-1338-466D-AAD8-584C79FED1AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "175954A5-E712-41B8-BC11-4F999343063D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.10:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "FF5A2AA3-BB1F-4DEA-A369-183877BBDAC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DF9E41E-8FE6-4396-A5D4-D4568600FE03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.11:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "7B43C508-91E3-49C9-86F0-3643D8F2B7F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "4457486F-E9B4-46B8-A05D-3B32F8B639A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.12:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "0831E658-36AB-4A4B-9929-3DB6BE855A3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "69417F54-D92F-46FB-9BFA-995211279C0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.12.1:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "46A770C7-A7D4-44E3-A8B4-AC2189EAC3DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "4611BEA0-25EC-4705-A390-6DF678373FF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.13:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "4BCD1F97-4B56-4DA8-A6EC-FA42A3CB9B97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "53022458-F443-4402-AC52-FC3AE810E89E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "120B85AA-E9B8-4A4D-81CE-FD36CDB63074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.15:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "64D94742-7CA1-487B-90E8-5063FBF88925",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "12302460-5D3F-4045-9DBF-606562E03BDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.16:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "78546FDF-C843-4E48-ABEE-CC3514AA7C3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D6EBC0B-9842-44D1-B9D6-EFB88BE22879",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.17:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "052969F1-6758-46E8-9273-E0F872BD65BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "624A0F00-4629-4550-847F-F24CC93DFF2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.18:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "E473F645-F8B0-43FE-957B-F053427465DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "10FC9AAB-1FAD-4953-A2FC-D42E9687D27E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.19:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "460C9907-AA19-402A-85DE-D3CEA98B107B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD80F0D6-6B5B-41D3-AC41-F1643865088A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.20:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "734D5198-53C1-40D3-B5BF-D74FC71FD3BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "788DEF5E-8A99-463D-89DC-0CC032271554",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.21:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "C0996D7A-9419-4897-A0AF-498AC3A2A81F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.21.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "62D670E6-47E5-4B40-9217-F97D5F39C3EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.21.1:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "94C23DB8-3C92-40FE-B8A6-ADF84D28510E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6CE7E4E-DA2D-4F03-A226-92965B40AE34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.22:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "0C59A947-457E-47EB-832E-3DA70CB52695",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "55F74B56-B412-4AF1-AED0-C948AB6DC829",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.23:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "3B50ADDB-D3C2-407D-8844-F93866E5F20C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "2775A7CC-2D88-4F2D-8C26-1E0DDDD681E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.24:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "F4149B59-E773-4ED8-A71D-EB7D00808819",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A0408C3-0FA7-4A17-9451-C4D46CDA8F27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.25:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "1726090D-0C37-44A4-AD9B-7ED733B8702D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "B92B045B-8CD6-4C04-9CCB-DCE9A44F6C12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.26:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "54354E16-3238-43E8-BAA9-93CA7EB44D4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.26.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6867EED4-FC3B-4B72-88A5-DED96C729FE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.26.1:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "1A0867FC-7161-433F-A416-D7207C8D4D36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.26.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "97BE6B60-3276-4580-843B-743D0D71E3DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.26.2:netsec:*:*:*:*:*:*",
              "matchCriteriaId": "36491B32-A405-4C5B-938F-9BEA50A8AF16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "6141909B-EBC4-4726-AE9F-669C31257A5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "754A51AC-EF20-4736-ADDB-D2A70BCB79EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.28.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4600BB66-6DEB-444B-AF9E-BDD06CFD2876",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE089E31-3521-4D12-B81C-B6E386AE1409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFE86E95-1110-46DF-9A7A-0E1AA56ACE4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.30.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B6DF5C5-85B4-4595-A69B-1DE70B5E0E41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.30.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F5E9888-16CD-4DB2-8889-CE4477559C71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.30.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C29C9A2C-6435-444E-A20B-5881F3798B85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.30.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E77A2569-CFAE-498D-A633-803849CFECE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "D16E88E6-42D0-400E-AF43-111B35CE11E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.31.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE15A42E-030B-48F0-9498-1755DAAEDFB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "39511726-1202-4179-9708-4D3B28496768",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A9A4328-F274-4591-A386-943FD6608374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.2.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B4A8C9A-A475-4F02-A6BC-F17CEECBF0AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E56DB29-571D-4615-B347-38CF4590E463",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "FC1188DA-6C27-48D2-9CE7-74D77B24EE9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "A93B8F91-5C56-44DE-AE29-8468E853759F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "BF7F4D02-7C8E-403C-A53E-A5F8C07F33A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D85031A3-3444-4650-905D-721F1EBAA24F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F0AC2B3-6E8A-4B26-8A6C-792D9E5072C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BC8D6D4-A389-4A78-8DA8-351A9CB896E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E979AC4-58EA-4297-9F90-350924BBE440",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A58CCD3-4A0C-468B-85F2-59A52B7293A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3542DB91-8487-49D6-AA15-E8FD9D6B99D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BA4F3F1-C3F1-4E15-A854-9BB84E33E4AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "661D710E-79F0-4E98-B35B-ED0549D35C24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "68291ADE-F9D1-427B-B150-FDA7F2F4788B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F80CBCB-F58D-4BE7-8E78-67E04C900D01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB61D32E-3400-480E-BD27-BA3F98F94427",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9154EDB-CAE6-4BB0-8D02-9EC2B81D93C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A432B0A7-F158-4B9C-97F6-6A29DB13EAFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "687C67CB-46AF-40C2-8A02-081C7F78568A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E8D6EC0-A61E-4DBC-A0C7-864E9C4BDA1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EF7F65A-45FD-4586-901E-49B057100BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "300F158E-ED27-46C8-85E4-AA0AA6B201DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB6F04C0-3226-4D2C-97A3-39999483C62C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "30685A20-963A-48D4-B7D7-2C11C2C812AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C54C3AAC-4D5D-4661-86AB-6849982E8C67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.16.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F847916-89F1-4AA6-973D-6002C8B54EE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.16.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5359815E-671A-4DFD-9E99-8CF903A03C84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2EFBC9E-4DCA-43CB-93EB-6807E2383A98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "98755B1B-CAD5-4AC5-8571-52E67C3A8274",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9D8C8FE-3D09-4F60-AD03-9D4439942141",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "902FBE4B-5237-43CD-8EB6-D2CAC0F30879",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "708DCACA-49EC-468D-81EC-CE5367F8A164",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "BA9E3314-7D23-414C-8187-16D807410B62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "D824ED7B-BAB6-4C0F-A6B0-A75AB072EC0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.19.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A01CE63-F834-48B2-826D-2DAD1B4AE8C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.19.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "88B9CC9D-3DC2-4674-BA52-4C6D4E2056C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "43F1849F-1230-45E7-B6A3-D6FC72EB0F11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "873C9C7E-93A3-4269-B19C-AB33A21C1AC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "457F2112-7C5E-4953-8F4C-117925D486DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "BD15ADD6-D7FA-441A-A9BC-487BCC15F2A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.20.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "792A8901-B7B8-40E8-9258-6338B72770FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E6C8F78-0C00-45A5-8FEB-2A4BD5AC1A37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F3E04247-C4EF-4C1B-B879-5C02986950D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "5E382FC8-4001-4058-9151-05AE98B4A35E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.21.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "11FECE6B-B6A6-4DDA-9019-9A10B05EC1F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.21.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9813D27-0688-4989-99EB-1DC0F82D59F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4333904-9D21-4149-965F-F49F0A34BD85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F7180626-F0FD-46F3-AD52-5C67525C4B46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "85A1E3A3-C157-4F3D-9477-F63771E7F627",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "FEE739CC-7A9C-489E-BFC0-6257129C043D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "ADC0E947-A95A-44ED-8DED-CC769FF00569",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "DE52BD9F-3728-455C-BC45-1A4DB926FFE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.22.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF82D41-9222-42D3-ADAD-94B4F950C63F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.22.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AE9F181-A8E4-4700-A30F-211CDE251606",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B10AE4B-EC2D-4D5B-B842-50F5097A0650",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "83E854D0-17A2-473B-B7E8-41E6447C81DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "47169133-3854-4D8F-B79E-3CC77A166EF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "6071601F-CF37-4E66-9D6D-AFC3434C18AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "2A575824-E005-4820-824A-4875594619E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.23.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "080C7089-5662-4A94-9842-C4A26095DA4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.23.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AE38697-0B16-4032-9234-CA263E4A9885",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCB18BE2-B073-429C-ABE7-B8305793DAE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.24:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FA7216BA-A42F-4ED8-8086-B4FA483FDAB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.24.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB7D2048-CD61-46C0-830B-11976B275783",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DBA63FE-62AF-4F3D-B30C-550D17C4E35F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.25:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "AD0A0F19-020D-4578-9023-12B0CB646D9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.25.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D5A1E3-FF0B-4C71-AA51-655D7106880D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5D425E6-E2E5-4452-9EAA-2697C1155784",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "9855FA26-0930-4AC9-A920-B394F6916349",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "BBA21246-7DF4-41BC-998A-05D38FC97C8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "EE9A7984-22C9-4296-8E44-C010E67F193D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "51B2C42A-C252-4BD8-A908-8F30C2BF15E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "2137CEAD-0F19-43C5-A26D-1972564FCD8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "B7552466-B782-4F16-8561-A2A51E94FED4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.26.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2F8C82D-3031-4C62-89FA-3BF56EA29727",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.26.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3074CEA-46BD-4CAD-BF5C-10008A80E434",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8374B5D-DE7A-4C3C-A5FE-579B17006A54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "C7494CE2-D3CC-404D-BE61-09A2E1FB3E47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "06E48482-D9AF-4038-80DA-27D9B4907C0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "9BC3C441-290F-471A-BA19-6B1C4D72A670",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "632ED295-B67D-43CF-BF38-CCE04088BA08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "50F3835F-6F2B-4EA7-B111-3B3C26548BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7BD2-7903-4DC5-ADDC-EFCDC58736C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "E5BECFE0-286F-4DA1-8CA9-6CEE861C3012",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta7.1:*:*:*:*:*:*",
              "matchCriteriaId": "AFFF3245-2D0F-46E3-A1D6-319086489DC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "C91F2524-99D1-4C4B-9A31-21C0FB8B4D5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:beta9:*:*:*:*:*:*",
              "matchCriteriaId": "7B1BC0FF-9DB6-4FCC-A845-053943CF0D24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "419D4D16-E790-4872-B9AF-1320978768C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "73D30BA6-1EE0-4C3F-8F69-65C698A1B9A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "D39FA25D-AB56-470D-94AB-14446DB7D475",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4225252F-5960-4A42-A575-00C125860E89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A65D76A8-BBDD-4BDE-B789-D745C400DCBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8B0F5A5-4252-4A9C-B830-2419E87AE5A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F9085056-3BE9-4309-9601-9CA0569BC215",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D8432455-9064-479F-B060-BF2A74ECC3EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E8EF2D7-371B-4268-989E-25225CC1F7B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABAC4CE9-1CFA-4279-B0CE-18F3C6FB9AB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E16E37A0-F739-4EEE-A1BB-EBC558C62767",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0E2562-D0FC-404C-B725-617AEEF20AB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "C831EC2A-C99D-4FB1-8E5C-2FF685792F2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "F37C4158-6C4E-448D-929B-288480748289",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BBA9D27-E3DC-45CE-B56B-2C6781AA6A16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.11:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "14CD1CCD-DFF2-4813-B56F-EA1C78AA818E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.11:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "4499411B-C92E-47F3-A6F2-8C9011B1CBCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "57325096-F4D8-4146-A6FD-93219F2C72D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.14:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "9684FD88-7422-4272-B9BC-D8638B1AA0B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "648639A2-26C4-4EDA-A982-25D400836696",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F9F6FF8-8B88-4A02-B23A-0CADA8CE316E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.16:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "37DE011D-1C1B-46AC-9265-F82693CE3C9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.0.16:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "790BF14A-0193-4A5C-802B-D82200B22342",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8FE4BCF-9AE7-4F41-BA84-E9537CC1EBE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "F25B0D15-7C09-4BBB-AC84-A1898F448DB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "F259057F-3720-45D8-91B4-70A11B759794",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "A106C460-4CE2-4AC3-B2FD-310F05507511",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "3E119FF9-2AD3-450D-8BBF-C6DD063246EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "759221D5-FC37-446D-9628-233B8D0B9120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F82D4812-0429-42D4-BD27-C76CB9E7C368",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F8FE11D6-8C0A-450E-B6DA-3AFE04D82232",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1FBCC8-4637-4A67-BFFD-C052C3C03C12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7307E10-9FA5-4940-B837-7936384F61DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "3D0DC9D6-D4D6-46CB-98DA-F4FC1835B6B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBBD0747-F3FF-46D8-A3C4-8268E37BC5AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "3F759F27-008E-47FB-AC0A-EF11DA19918E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D15C82BA-BD1F-4A19-A907-E6C30042F537",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E802481-C8BD-4218-8CDC-5DB112DA946C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0004AADE-1652-4242-A97D-E9818FE03CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "543E9C91-60FE-43AE-9B94-08DD730BA814",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:digium:asterisknow:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF81215F-0DD3-48FC-BA1C-19E42FCD47B5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:digium:s800i:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "565444DE-F67C-4B6E-AC1E-92FC0D8A87CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:digium:s800i:1.3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "80E356B2-4AEA-4532-A6F8-13B814BEB2C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:digium:s800i:1.3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60F261AB-3172-4245-8090-744294A0D08A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:digium:s800i:1.3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3DD6B08-D77D-4275-8F91-2CA47FF6E363",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:digium:asterisk:a:-:business:*:*:*:*:*",
              "matchCriteriaId": "B1868709-03F9-47AA-A196-367D783C62BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:b:-:business:*:*:*:*:*",
              "matchCriteriaId": "564A4529-997D-4615-BED8-AE3FB159689A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:b.1.3.2:-:business:*:*:*:*:*",
              "matchCriteriaId": "FE9D66C4-F49D-4EC4-B5A9-24F28726A9B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:b.1.3.3:-:business:*:*:*:*:*",
              "matchCriteriaId": "BEFA5054-D5F9-4D07-9A66-D7AAD6953F5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:b.2.2.0:-:business:*:*:*:*:*",
              "matchCriteriaId": "D110DCEB-F2F9-4600-B49F-22952C71B785",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:b.2.2.1:-:business:*:*:*:*:*",
              "matchCriteriaId": "3333A119-D92F-433C-BF5D-0037199256C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:b.2.3.1:-:business:*:*:*:*:*",
              "matchCriteriaId": "19C44C33-EADA-48FD-A634-8066A003AFD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:b.2.3.2:-:business:*:*:*:*:*",
              "matchCriteriaId": "294A2BA2-26EB-40AD-B861-7FA9043CD097",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:b.2.3.3:-:business:*:*:*:*:*",
              "matchCriteriaId": "4FAC61AF-BDF2-4397-A8F8-9D9155836E4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:b.2.3.4:-:business:*:*:*:*:*",
              "matchCriteriaId": "33DE61C2-8C6A-4CD3-8D56-E70C4356CD50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:b.2.3.5:-:business:*:*:*:*:*",
              "matchCriteriaId": "EECB5F75-BCE2-4777-933E-25EB5657750C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:b.2.3.6:-:business:*:*:*:*:*",
              "matchCriteriaId": "B5D51557-3E67-4C9A-9753-472D13FCA5C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:b.2.5.0:-:business:*:*:*:*:*",
              "matchCriteriaId": "C063FCFA-B1C3-4ACB-B9E7-B3FC973FD898",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:b.2.5.1:-:business:*:*:*:*:*",
              "matchCriteriaId": "761DB3A3-1540-4976-AEB2-F8E45CCCC5E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:b.2.5.2:-:business:*:*:*:*:*",
              "matchCriteriaId": "B53CD2C1-9BF0-42F9-B3E3-2C9915E531C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:b.2.5.3:-:business:*:*:*:*:*",
              "matchCriteriaId": "947F58B8-21AF-460B-8203-D2605A1F91D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:c:-:business:*:*:*:*:*",
              "matchCriteriaId": "7CD989BE-8FA0-4EDB-8442-C2E12BD01D27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:c.2.3:-:business:*:*:*:*:*",
              "matchCriteriaId": "3FA908BA-BEF8-44A5-AC95-E7CF020D0C94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:c.3.0:-:business:*:*:*:*:*",
              "matchCriteriaId": "78E8936C-033B-49E6-BB39-D5BBBC80EB55",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Asterisk Open Source 1.2.x before 1.2.35, 1.4.x before 1.4.26.3, 1.6.0.x before 1.6.0.17, and 1.6.1.x before 1.6.1.9; Business Edition A.x.x, B.x.x before B.2.5.12, C.2.x.x before C.2.4.5, and C.3.x.x before C.3.2.2; AsteriskNOW 1.5; and s800i 1.3.x before 1.3.0.5 generate different error messages depending on whether a SIP username is valid, which allows remote attackers to enumerate valid usernames via multiple crafted REGISTER messages with inconsistent usernames in the URI in the To header and the Digest in the Authorization header."
    },
    {
      "lang": "es",
      "value": "Asterisk Open Source versi\u00f3n 1.2.x anterior a 1.2.35, versi\u00f3n 1.4.x anterior a 1.4.26.3, versi\u00f3n 1.6.0.x anterior a 1.6.0.17 y versi\u00f3n 1.6.1.x anterior a 1.6.1.9; Business Edition versi\u00f3n A.x.x, versi\u00f3n B.x.x anteriores a B.2.5.12, versi\u00f3n C.2.x.x anterior a C.2.4.5 y versi\u00f3n C.3.x.x anterior a C.3.2.2; AsteriskNOW versi\u00f3n 1.5; y s800i versi\u00f3n 1.3.x anterior a 1.3.0.5, causan diferentes mensajes de error dependiendo de si un nombre de usuario SIP sea v\u00e1lido, lo que permite a los atacantes remotos enumerar nombres de usuario v\u00e1lidos mediante m\u00faltiples mensajes de REGISTER creados con nombres de usuario inconsistentes en el URI en el encabezado To y el Digest en el encabezado Authorization."
    }
  ],
  "id": "CVE-2009-3727",
  "lastModified": "2024-11-21T01:08:03.907",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-11-10T18:30:00.250",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://downloads.asterisk.org/pub/security/AST-2009-008.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://osvdb.org/59697"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37265"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/37479"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/37677"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2009/dsa-1952"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/36924"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id?1023133"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=523277"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533137"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00789.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00838.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://downloads.asterisk.org/pub/security/AST-2009-008.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/59697"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37265"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/37479"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/37677"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2009/dsa-1952"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/36924"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1023133"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=523277"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533137"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00789.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00838.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-03-15 17:55
Modified
2024-11-21 01:25
Severity ?
Summary
Multiple stack-based and heap-based buffer overflows in the (1) decode_open_type and (2) udptl_rx_packet functions in main/udptl.c in Asterisk Open Source 1.4.x before 1.4.39.2, 1.6.1.x before 1.6.1.22, 1.6.2.x before 1.6.2.16.2, and 1.8 before 1.8.2.4; Business Edition C.x.x before C.3.6.3; AsteriskNOW 1.5; and s800i (Asterisk Appliance), when T.38 support is enabled, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UDPTL packet.
References
secalert@redhat.comhttp://downloads.asterisk.org/pub/security/AST-2011-002.htmlVendor Advisory
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-March/055030.htmlPatch
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-March/055421.htmlPatch
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-March/055634.htmlPatch
secalert@redhat.comhttp://secunia.com/advisories/43429Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/43702Vendor Advisory
secalert@redhat.comhttp://www.debian.org/security/2011/dsa-2225
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/03/11/2
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/03/11/8
secalert@redhat.comhttp://www.securityfocus.com/bid/46474
secalert@redhat.comhttp://www.securitytracker.com/id?1025101
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0635Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://downloads.asterisk.org/pub/security/AST-2011-002.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055030.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055421.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055634.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43429Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43702Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2225
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/03/11/2
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/03/11/8
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/46474
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1025101
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0635Vendor Advisory
Impacted products
Vendor Product Version
digium asterisk 1.4.0
digium asterisk 1.4.0
digium asterisk 1.4.0
digium asterisk 1.4.0
digium asterisk 1.4.0
digium asterisk 1.4.1
digium asterisk 1.4.2
digium asterisk 1.4.3
digium asterisk 1.4.10
digium asterisk 1.4.10.1
digium asterisk 1.4.11
digium asterisk 1.4.12
digium asterisk 1.4.12.1
digium asterisk 1.4.13
digium asterisk 1.4.14
digium asterisk 1.4.15
digium asterisk 1.4.16
digium asterisk 1.4.16.1
digium asterisk 1.4.16.2
digium asterisk 1.4.17
digium asterisk 1.4.18
digium asterisk 1.4.19
digium asterisk 1.4.19
digium asterisk 1.4.19
digium asterisk 1.4.19
digium asterisk 1.4.19
digium asterisk 1.4.19.1
digium asterisk 1.4.19.2
digium asterisk 1.4.20
digium asterisk 1.4.20
digium asterisk 1.4.20
digium asterisk 1.4.20
digium asterisk 1.4.20.1
digium asterisk 1.4.21
digium asterisk 1.4.21
digium asterisk 1.4.21
digium asterisk 1.4.21.1
digium asterisk 1.4.21.2
digium asterisk 1.4.22
digium asterisk 1.4.22
digium asterisk 1.4.22
digium asterisk 1.4.22
digium asterisk 1.4.22
digium asterisk 1.4.22
digium asterisk 1.4.22.1
digium asterisk 1.4.22.2
digium asterisk 1.4.23
digium asterisk 1.4.23
digium asterisk 1.4.23
digium asterisk 1.4.23
digium asterisk 1.4.23
digium asterisk 1.4.23.1
digium asterisk 1.4.23.2
digium asterisk 1.4.24
digium asterisk 1.4.24
digium asterisk 1.4.24.1
digium asterisk 1.4.25
digium asterisk 1.4.25
digium asterisk 1.4.25.1
digium asterisk 1.4.26
digium asterisk 1.4.26
digium asterisk 1.4.26
digium asterisk 1.4.26
digium asterisk 1.4.26
digium asterisk 1.4.26
digium asterisk 1.4.26
digium asterisk 1.4.26.1
digium asterisk 1.4.26.2
digium asterisk 1.4.26.3
digium asterisk 1.4.27
digium asterisk 1.4.27
digium asterisk 1.4.27
digium asterisk 1.4.27
digium asterisk 1.4.27
digium asterisk 1.4.27
digium asterisk 1.4.27.1
digium asterisk 1.4.28
digium asterisk 1.4.28
digium asterisk 1.4.29
digium asterisk 1.4.29
digium asterisk 1.4.29.1
digium asterisk 1.4.30
digium asterisk 1.4.30
digium asterisk 1.4.30
digium asterisk 1.4.31
digium asterisk 1.4.31
digium asterisk 1.4.31
digium asterisk 1.4.32
digium asterisk 1.4.32
digium asterisk 1.4.33
digium asterisk 1.4.33
digium asterisk 1.4.33
digium asterisk 1.4.33.1
digium asterisk 1.4.34
digium asterisk 1.4.34
digium asterisk 1.4.34
digium asterisk 1.4.35
digium asterisk 1.4.35
digium asterisk 1.4.36
digium asterisk 1.4.36
digium asterisk 1.4.37
digium asterisk 1.4.37
digium asterisk 1.4.38
digium asterisk 1.4.38
digium asterisk 1.4.39
digium asterisk 1.4.39
digium asterisk 1.4.39.1
digium asterisk 1.6.2.0
digium asterisk 1.6.2.0
digium asterisk 1.6.2.0
digium asterisk 1.6.2.0
digium asterisk 1.6.2.0
digium asterisk 1.6.2.0
digium asterisk 1.6.2.0
digium asterisk 1.6.2.0
digium asterisk 1.6.2.1
digium asterisk 1.6.2.1
digium asterisk 1.6.2.2
digium asterisk 1.6.2.3
digium asterisk 1.6.2.4
digium asterisk 1.6.2.5
digium asterisk 1.6.2.6
digium asterisk 1.6.2.6
digium asterisk 1.6.2.6
digium asterisk 1.6.2.15
digium asterisk 1.6.2.16
digium asterisk 1.6.2.16
digium asterisk 1.6.2.16.1
digium asterisk 1.8.0
digium asterisk 1.8.0
digium asterisk 1.8.0
digium asterisk 1.8.0
digium asterisk 1.8.0
digium asterisk 1.8.0
digium asterisk 1.8.0
digium asterisk 1.8.0
digium asterisk 1.8.0
digium asterisk 1.8.0
digium asterisk 1.8.1
digium asterisk 1.8.1
digium asterisk 1.8.1.1
digium asterisk 1.8.1.2
digium asterisk 1.8.2
digium asterisk 1.8.2.1
digium asterisk 1.8.2.2
digium asterisk 1.8.2.3
digium asterisk c.1.0
digium asterisk c.1.0
digium asterisk c.1.6
digium asterisk c.1.6.1
digium asterisk c.1.6.2
digium asterisk c.1.8.0
digium asterisk c.1.8.1
digium asterisk c.2.3
digium asterisk c.3.0
digium asterisk c.3.1.0
digium asterisk c.3.1.1
digium asterisk c.3.2.2
digium asterisk c.3.2.3
digium asterisk c.3.3.2
digium asterisk c.3.6.2
digium asterisknow 1.5
digium s800i *
digium asterisk 1.6.1.0
digium asterisk 1.6.1.0
digium asterisk 1.6.1.0
digium asterisk 1.6.1.0
digium asterisk 1.6.1.0
digium asterisk 1.6.1.1
digium asterisk 1.6.1.2
digium asterisk 1.6.1.3
digium asterisk 1.6.1.4
digium asterisk 1.6.1.5
digium asterisk 1.6.1.5
digium asterisk 1.6.1.6
digium asterisk 1.6.1.7
digium asterisk 1.6.1.7
digium asterisk 1.6.1.8
digium asterisk 1.6.1.9
digium asterisk 1.6.1.10
digium asterisk 1.6.1.10
digium asterisk 1.6.1.10
digium asterisk 1.6.1.10
digium asterisk 1.6.1.11
digium asterisk 1.6.1.12
digium asterisk 1.6.1.12
digium asterisk 1.6.1.13
digium asterisk 1.6.1.13
digium asterisk 1.6.1.14
digium asterisk 1.6.1.15
digium asterisk 1.6.1.16
digium asterisk 1.6.1.17
digium asterisk 1.6.1.18
digium asterisk 1.6.1.18
digium asterisk 1.6.1.18
digium asterisk 1.6.1.19
digium asterisk 1.6.1.19
digium asterisk 1.6.1.19
digium asterisk 1.6.1.19
digium asterisk 1.6.1.20
digium asterisk 1.6.1.20
digium asterisk 1.6.1.20
digium asterisk 1.6.1.21



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E56DB29-571D-4615-B347-38CF4590E463",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "FC1188DA-6C27-48D2-9CE7-74D77B24EE9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "A93B8F91-5C56-44DE-AE29-8468E853759F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "BF7F4D02-7C8E-403C-A53E-A5F8C07F33A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "D85031A3-3444-4650-905D-721F1EBAA24F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F0AC2B3-6E8A-4B26-8A6C-792D9E5072C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BC8D6D4-A389-4A78-8DA8-351A9CB896E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E979AC4-58EA-4297-9F90-350924BBE440",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9154EDB-CAE6-4BB0-8D02-9EC2B81D93C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A432B0A7-F158-4B9C-97F6-6A29DB13EAFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "687C67CB-46AF-40C2-8A02-081C7F78568A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E8D6EC0-A61E-4DBC-A0C7-864E9C4BDA1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EF7F65A-45FD-4586-901E-49B057100BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "300F158E-ED27-46C8-85E4-AA0AA6B201DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB6F04C0-3226-4D2C-97A3-39999483C62C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "30685A20-963A-48D4-B7D7-2C11C2C812AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C54C3AAC-4D5D-4661-86AB-6849982E8C67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.16.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F847916-89F1-4AA6-973D-6002C8B54EE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.16.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5359815E-671A-4DFD-9E99-8CF903A03C84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2EFBC9E-4DCA-43CB-93EB-6807E2383A98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "98755B1B-CAD5-4AC5-8571-52E67C3A8274",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9D8C8FE-3D09-4F60-AD03-9D4439942141",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "902FBE4B-5237-43CD-8EB6-D2CAC0F30879",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "708DCACA-49EC-468D-81EC-CE5367F8A164",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "BA9E3314-7D23-414C-8187-16D807410B62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.19:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "D824ED7B-BAB6-4C0F-A6B0-A75AB072EC0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.19.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A01CE63-F834-48B2-826D-2DAD1B4AE8C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.19.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "88B9CC9D-3DC2-4674-BA52-4C6D4E2056C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "43F1849F-1230-45E7-B6A3-D6FC72EB0F11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "873C9C7E-93A3-4269-B19C-AB33A21C1AC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "457F2112-7C5E-4953-8F4C-117925D486DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.20:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "BD15ADD6-D7FA-441A-A9BC-487BCC15F2A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.20.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "792A8901-B7B8-40E8-9258-6338B72770FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E6C8F78-0C00-45A5-8FEB-2A4BD5AC1A37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F3E04247-C4EF-4C1B-B879-5C02986950D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.21:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "5E382FC8-4001-4058-9151-05AE98B4A35E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.21.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "11FECE6B-B6A6-4DDA-9019-9A10B05EC1F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.21.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9813D27-0688-4989-99EB-1DC0F82D59F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4333904-9D21-4149-965F-F49F0A34BD85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F7180626-F0FD-46F3-AD52-5C67525C4B46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "85A1E3A3-C157-4F3D-9477-F63771E7F627",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "FEE739CC-7A9C-489E-BFC0-6257129C043D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "ADC0E947-A95A-44ED-8DED-CC769FF00569",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.22:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "DE52BD9F-3728-455C-BC45-1A4DB926FFE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.22.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF82D41-9222-42D3-ADAD-94B4F950C63F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.22.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AE9F181-A8E4-4700-A30F-211CDE251606",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B10AE4B-EC2D-4D5B-B842-50F5097A0650",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "83E854D0-17A2-473B-B7E8-41E6447C81DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "47169133-3854-4D8F-B79E-3CC77A166EF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "6071601F-CF37-4E66-9D6D-AFC3434C18AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.23:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "2A575824-E005-4820-824A-4875594619E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.23.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "080C7089-5662-4A94-9842-C4A26095DA4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.23.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AE38697-0B16-4032-9234-CA263E4A9885",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCB18BE2-B073-429C-ABE7-B8305793DAE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.24:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FA7216BA-A42F-4ED8-8086-B4FA483FDAB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.24.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB7D2048-CD61-46C0-830B-11976B275783",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DBA63FE-62AF-4F3D-B30C-550D17C4E35F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.25:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "AD0A0F19-020D-4578-9023-12B0CB646D9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.25.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D5A1E3-FF0B-4C71-AA51-655D7106880D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5D425E6-E2E5-4452-9EAA-2697C1155784",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "9855FA26-0930-4AC9-A920-B394F6916349",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "BBA21246-7DF4-41BC-998A-05D38FC97C8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "EE9A7984-22C9-4296-8E44-C010E67F193D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "51B2C42A-C252-4BD8-A908-8F30C2BF15E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "2137CEAD-0F19-43C5-A26D-1972564FCD8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.26:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "B7552466-B782-4F16-8561-A2A51E94FED4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.26.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2F8C82D-3031-4C62-89FA-3BF56EA29727",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.26.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3074CEA-46BD-4CAD-BF5C-10008A80E434",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.26.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6AB8988-FCC6-407A-A7D9-2F7A3A7488B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "E06848DE-6EE1-4FD0-A14F-39D41B2F3E75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CF342950-FDD7-41A9-94D5-EDF41130B61E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "6E4543AA-3D54-4444-AD1F-381A87A89DA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "AF3036DD-261C-4975-A01E-92CD29479588",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "EF07C116-27DC-4875-9DCF-049E2A8EAEA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.27:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "88FBC328-538A-4484-A342-1688D9669B9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.27.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBF2301E-F6EF-4D28-82EE-FA1AB8CA9E43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "A53F637C-846A-43FC-BA71-C8571648FA46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.28:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E61070F4-1B6B-4814-918E-459DE5119A24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "70664E0F-09CF-42C2-A7A7-E635D022E90D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.29:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D1E13E1A-C2D4-4E5A-84C8-E6AF061D67C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.29.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E811134-B657-4C50-9AEF-A7F68CA5577A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C4CD101-F079-4940-AA79-886B69A7A514",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.30:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B7B828E9-5BE3-4E6F-8048-F2B1F2E929CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.30:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "75BB2066-74A6-4F89-B54C-35F234DC1F03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE522334-BF53-4E34-949B-CD928B59A341",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.31:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "648DEC0E-3CBC-4EA2-AF27-2C518B0762CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.31:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B50F4BAE-D00D-4352-B52B-BE1A9FFB6949",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7A35508-8235-4915-8810-12B2630C82C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.32:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "63DD4EE5-6F56-41C7-9CB4-16ADF4F63B8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "2347E451-2F89-4EA6-A6E0-22BCB0C8A56E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.33:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A86F5360-6FE4-4EA2-9208-076E78C842A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.33:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "3CDFA85B-17A4-4ECC-9922-F5546917B4C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.33.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D7D7DB7-32A7-490E-AED2-C404D371E7C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "A03632BC-CA0F-42BD-8839-A72DB146A4A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.34:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "9DC4EF64-6A1D-47CB-AC07-48CABB612DCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.34:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "68C00FEF-7850-48F4-8122-4211D080B508",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3A48F07-42E1-47E9-94EA-44D20A0BAC3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.35:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "87D16470-5892-4289-BB35-B69100BCA31E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "15E71BD7-83D1-4E2B-AD40-BB6B53056C89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.36:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "87FDE2E2-5F08-43EF-BBD8-7DCCC0C98870",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "347E9D8C-A372-41F2-AB48-FFCAB454C9C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.37:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "74F67E57-1DD0-4850-8D7E-7A9748BD106C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "B208C056-B567-4BEE-A9B7-AEB394341D5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.38:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A0C3A2D4-07A9-4D28-AC18-03523E9FF34A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6516E0F-9F60-4D20-88D3-B9CD8DC93062",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.39:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "22147B91-45A4-4834-AC8D-2DC17A706BEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.4.39.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "677C10DE-46D8-4EF1-BF22-63F3AE37CBC2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F8B700A-FACB-4BC8-9DF2-972DC63D852B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FFD31B9B-2F43-4637-BE56-47A807384BF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E6450D6B-C907-49E6-9788-E4029C09285F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "DDB0432E-024A-4C0C-87FF-448E513D2834",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "D6A6A343-FEA2-49E5-9858-455AE3B29470",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "D57B94E3-EA37-466C-ADC4-5180D4502FDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "64D35A89-6B21-4770-AA0F-424C5C91A254",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "14817302-A34A-4980-B148-AEB4B3B49BE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FDFA96-E62A-413B-9846-F51F1F7349EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "DA924386-49F6-4371-B975-B1473EEA12F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B74A1B99-8901-4690-B994-1DAD3EFA5ABB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "4253C7DD-3588-4B35-B96D-C027133BE93F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "24AE11DB-16D3-42BF-BC64-E8982107D35B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "53841D77-926C-4362-BC85-BD8B6AC4391D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F98FD6E6-EDE9-437D-B7C2-2DB65B73D230",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "4BA6CA77-D358-4623-8400-78EFC47ADB7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B4E62DAB-45E0-4EAA-8E45-6D3757A679D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.15:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1355578C-B384-401A-9123-2789CBECAD0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "3491F8DB-A162-4608-B5F9-5401FE058CEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "C52730A8-D96E-46C1-8905-1D78A93E9C84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E5CD17-B14A-4BDB-BA75-261344FF6F25",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6344E43-E8AA-4340-B3A7-72F5D6A5D184",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "4C170C1C-909D-4439-91B5-DB1A9CD150C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "EE821BE5-B1D3-4854-A700-3A83E5F15724",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "149C57CA-0B4B-4220-87FC-432418D1C393",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "035595D5-BBEC-4D85-AD7A-A2C932D2BA70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "6DAF5655-F09F-47F8-AFA6-4B95F77A57F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "F8E001D8-0A7B-4FDD-88E3-E124ED32B81C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "9D5CFFBD-785F-4417-A54A-F3565FD6E736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "D30EF999-92D1-4B19-8E32-1E4B35DE4EA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "A67D156B-9C43-444F-ADEC-B21D99D1433C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "893EB152-6444-43DB-8714-9735354C873A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F8447EE7-A834-41D7-9204-07BD3752870C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C04F2C9-5672-42F2-B664-A3EE4C954C29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "33465668-4C91-4619-960A-D26D77853E53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAD08674-0B44-44EA-940B-6812E2D5077D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE87710-A129-43AA-BA08-8001848975FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F582C6E-5DA0-4D72-A40E-66BDBC5CF2B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E7CEBB8-01B3-4A05-AFE8-37A143C9833E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:digium:asterisk:c.1.0:beta7:business:*:*:*:*:*",
              "matchCriteriaId": "1C4E15BB-71AB-4936-9CA7-E844572A3953",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:c.1.0:beta8:business:*:*:*:*:*",
              "matchCriteriaId": "EE5823E1-5BFF-44E0-B8DD-4D994073DC1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:c.1.6:-:business:*:*:*:*:*",
              "matchCriteriaId": "E6C147EF-0C39-4979-A4F6-C0BE288F083F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:c.1.6.1:-:business:*:*:*:*:*",
              "matchCriteriaId": "0C1A8352-DE70-4D4E-BC4D-8EABE5431646",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:c.1.6.2:-:business:*:*:*:*:*",
              "matchCriteriaId": "615D7356-E9DD-4149-B1BE-D3C3475A8841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:c.1.8.0:-:business:*:*:*:*:*",
              "matchCriteriaId": "0628E34F-1A60-416D-A29C-EA28E8CC2430",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:c.1.8.1:-:business:*:*:*:*:*",
              "matchCriteriaId": "5F54511A-A2A9-4038-9D7D-2283A6709DB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:c.2.3:-:business:*:*:*:*:*",
              "matchCriteriaId": "3FA908BA-BEF8-44A5-AC95-E7CF020D0C94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:c.3.0:-:business:*:*:*:*:*",
              "matchCriteriaId": "78E8936C-033B-49E6-BB39-D5BBBC80EB55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:c.3.1.0:-:business:*:*:*:*:*",
              "matchCriteriaId": "5D05D04F-CD6C-4A73-885C-306D7A5CC7C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:c.3.1.1:-:business:*:*:*:*:*",
              "matchCriteriaId": "3805B5F3-A4CD-469F-9F8A-A271A79A2B7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:c.3.2.2:-:business:*:*:*:*:*",
              "matchCriteriaId": "9FAEBE5E-378A-40DC-B2B9-31F6D1305BCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:c.3.2.3:-:business:*:*:*:*:*",
              "matchCriteriaId": "617B3FE8-39E3-41C0-9348-9507DA43DE93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:c.3.3.2:-:business:*:*:*:*:*",
              "matchCriteriaId": "04AB4C82-71BB-49B7-B4F3-4E75EFB5F1A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:c.3.6.2:-:business:*:*:*:*:*",
              "matchCriteriaId": "78B55176-E269-411B-974A-B5D2CE8E08C2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:digium:asterisknow:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF81215F-0DD3-48FC-BA1C-19E42FCD47B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:digium:s800i:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E063F5CE-AAF1-4FB0-9D75-E26F30B85409",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8FE4BCF-9AE7-4F41-BA84-E9537CC1EBE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "F25B0D15-7C09-4BBB-AC84-A1898F448DB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "F259057F-3720-45D8-91B4-70A11B759794",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "A106C460-4CE2-4AC3-B2FD-310F05507511",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "3E119FF9-2AD3-450D-8BBF-C6DD063246EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "759221D5-FC37-446D-9628-233B8D0B9120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F82D4812-0429-42D4-BD27-C76CB9E7C368",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F8FE11D6-8C0A-450E-B6DA-3AFE04D82232",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1FBCC8-4637-4A67-BFFD-C052C3C03C12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7307E10-9FA5-4940-B837-7936384F61DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "3D0DC9D6-D4D6-46CB-98DA-F4FC1835B6B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBBD0747-F3FF-46D8-A3C4-8268E37BC5AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "3F759F27-008E-47FB-AC0A-EF11DA19918E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D15C82BA-BD1F-4A19-A907-E6C30042F537",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E802481-C8BD-4218-8CDC-5DB112DA946C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6FC8A53-E3C0-4660-BE75-2B5B8B4F8160",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "93C020CD-D0EA-4B3E-B33C-F900B08B28FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0004AADE-1652-4242-A97D-E9818FE03CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "543E9C91-60FE-43AE-9B94-08DD730BA814",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "252849FA-F46E-4F5A-A488-AA53574CA884",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EB89B4F-9546-4DF0-B69F-1B9F289BB1E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E254415-1D59-4A77-80FB-AE3EF10FBB32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "DF2407D0-C324-45C4-9FBB-4294F747DBDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "F23A36CC-9AA2-4559-946D-6D0621664342",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "89C40652-E180-416A-B88A-E6313530E98A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "A28C2C5D-A573-4036-A600-BE28A3E417B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.15:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "EE162390-359F-4C5D-902B-275FB1FC3EF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A0A3750-0D34-4FB5-B897-17CA0D0B7CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "D11BE58D-5B7E-4BB5-988A-7FC2E4B92C4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "22631AE6-5DA1-46C6-A239-C232DA0D0E7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.18:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "9F5CB8CC-4CC1-4A1B-8AD1-C876D1BC80EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.18:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "8591DB43-EAA0-4D58-BA23-EAD916DEA3DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E4747F8-1AFC-4AEF-82D8-D6604FB5222E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.19:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B82172C9-EA5B-4FC9-A445-0A297AE56FF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.19:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "0C71CDAB-A299-4F1D-942D-851C899E63BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.19:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E2FA9AB9-4C83-45A3-9772-3A16030DBF1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A88C639A-9229-4D99-9087-1B0B95539BD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.20:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0B7DE987-7351-495A-8776-37E6B7BF0C0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.20:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "CB5823CC-941F-47AB-AD1F-325181D40E60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "712AF374-846D-4F21-91C4-1BA9AB33E46D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple stack-based and heap-based buffer overflows in the (1) decode_open_type and (2) udptl_rx_packet functions in main/udptl.c in Asterisk Open Source 1.4.x before 1.4.39.2, 1.6.1.x before 1.6.1.22, 1.6.2.x before 1.6.2.16.2, and 1.8 before 1.8.2.4; Business Edition C.x.x before C.3.6.3; AsteriskNOW 1.5; and s800i (Asterisk Appliance), when T.38 support is enabled, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UDPTL packet."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamientos de b\u00fafer en las funciones (1) decode_open_type y (2) udptl_rx_packet en main/udptl.c en Asterisk Open Source v1.4.x anterior a v1.4.39.2, v1.6.1.x antes de v1.6.1.22, v1.6.2.x antes de v1.6.2.16.2, y v1.8 antes de v1.8.2.4; Business Edition vC.x.x antes de vC.3.6.3; AsteriskNOW v1.5; y s800i (Asterisk Appliance), cuando el soporte T.38 est\u00e1 activo, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un paquete UDPTL manipulado"
    }
  ],
  "id": "CVE-2011-1147",
  "lastModified": "2024-11-21T01:25:39.780",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-03-15T17:55:05.953",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://downloads.asterisk.org/pub/security/AST-2011-002.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055030.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055421.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055634.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/43429"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/43702"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2011/dsa-2225"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2011/03/11/2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2011/03/11/8"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/46474"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id?1025101"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0635"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://downloads.asterisk.org/pub/security/AST-2011-002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055030.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055421.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055634.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/43429"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/43702"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2225"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2011/03/11/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2011/03/11/8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/46474"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025101"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0635"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}