CVE-2009-4055
Vulnerability from cvelistv5
Published
2009-12-02 11:00
Modified
2024-08-07 06:45
Severity ?
Summary
rtp.c in Asterisk Open Source 1.2.x before 1.2.37, 1.4.x before 1.4.27.1, 1.6.0.x before 1.6.0.19, and 1.6.1.x before 1.6.1.11; Business Edition B.x.x before B.2.5.13, C.2.x.x before C.2.4.6, and C.3.x.x before C.3.2.3; and s800i 1.3.x before 1.3.0.6 allows remote attackers to cause a denial of service (daemon crash) via an RTP comfort noise payload with a long data length.
References
cve@mitre.orghttp://downloads.asterisk.org/pub/security/AST-2009-010-1.2.diff.txtExploit
cve@mitre.orghttp://downloads.asterisk.org/pub/security/AST-2009-010-1.4.diff.txtExploit
cve@mitre.orghttp://downloads.asterisk.org/pub/security/AST-2009-010-1.6.0.diff.txtExploit
cve@mitre.orghttp://downloads.asterisk.org/pub/security/AST-2009-010-1.6.1.diff.txtExploit
cve@mitre.orghttp://downloads.digium.com/pub/security/AST-2009-010.htmlVendor Advisory
cve@mitre.orghttp://secunia.com/advisories/37530Exploit, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/37677
cve@mitre.orghttp://secunia.com/advisories/37708
cve@mitre.orghttp://securitytracker.com/id?1023249
cve@mitre.orghttp://www.debian.org/security/2009/dsa-1952
cve@mitre.orghttp://www.osvdb.org/60569
cve@mitre.orghttp://www.redhat.com/archives/fedora-package-announce/2009-December/msg00759.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/508147/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/37153
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/3368Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/54471
cve@mitre.orghttps://issues.asterisk.org/view.php?id=16242
af854a3a-2127-422b-91ae-364da2661108http://downloads.asterisk.org/pub/security/AST-2009-010-1.2.diff.txtExploit
af854a3a-2127-422b-91ae-364da2661108http://downloads.asterisk.org/pub/security/AST-2009-010-1.4.diff.txtExploit
af854a3a-2127-422b-91ae-364da2661108http://downloads.asterisk.org/pub/security/AST-2009-010-1.6.0.diff.txtExploit
af854a3a-2127-422b-91ae-364da2661108http://downloads.asterisk.org/pub/security/AST-2009-010-1.6.1.diff.txtExploit
af854a3a-2127-422b-91ae-364da2661108http://downloads.digium.com/pub/security/AST-2009-010.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37530Exploit, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37677
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37708
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1023249
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1952
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/60569
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/archives/fedora-package-announce/2009-December/msg00759.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/508147/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/37153
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/3368Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/54471
af854a3a-2127-422b-91ae-364da2661108https://issues.asterisk.org/view.php?id=16242
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:45:51.226Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "37153",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/37153"
          },
          {
            "name": "20091130 AST-2009-010: RTP Remote Crash Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/508147/100/0/threaded"
          },
          {
            "name": "37677",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37677"
          },
          {
            "name": "1023249",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1023249"
          },
          {
            "name": "DSA-1952",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1952"
          },
          {
            "name": "asterisk-rtp-comfortnoise-dos(54471)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54471"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.4.diff.txt"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.6.0.diff.txt"
          },
          {
            "name": "37530",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37530"
          },
          {
            "name": "FEDORA-2009-12461",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/archives/fedora-package-announce/2009-December/msg00759.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.asterisk.org/view.php?id=16242"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.6.1.diff.txt"
          },
          {
            "name": "37708",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37708"
          },
          {
            "name": "60569",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/60569"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://downloads.digium.com/pub/security/AST-2009-010.html"
          },
          {
            "name": "ADV-2009-3368",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3368"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.2.diff.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-11-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "rtp.c in Asterisk Open Source 1.2.x before 1.2.37, 1.4.x before 1.4.27.1, 1.6.0.x before 1.6.0.19, and 1.6.1.x before 1.6.1.11; Business Edition B.x.x before B.2.5.13, C.2.x.x before C.2.4.6, and C.3.x.x before C.3.2.3; and s800i 1.3.x before 1.3.0.6 allows remote attackers to cause a denial of service (daemon crash) via an RTP comfort noise payload with a long data length."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "37153",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/37153"
        },
        {
          "name": "20091130 AST-2009-010: RTP Remote Crash Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/508147/100/0/threaded"
        },
        {
          "name": "37677",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37677"
        },
        {
          "name": "1023249",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1023249"
        },
        {
          "name": "DSA-1952",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1952"
        },
        {
          "name": "asterisk-rtp-comfortnoise-dos(54471)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54471"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.4.diff.txt"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.6.0.diff.txt"
        },
        {
          "name": "37530",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37530"
        },
        {
          "name": "FEDORA-2009-12461",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.redhat.com/archives/fedora-package-announce/2009-December/msg00759.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.asterisk.org/view.php?id=16242"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.6.1.diff.txt"
        },
        {
          "name": "37708",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37708"
        },
        {
          "name": "60569",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/60569"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://downloads.digium.com/pub/security/AST-2009-010.html"
        },
        {
          "name": "ADV-2009-3368",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3368"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.2.diff.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-4055",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "rtp.c in Asterisk Open Source 1.2.x before 1.2.37, 1.4.x before 1.4.27.1, 1.6.0.x before 1.6.0.19, and 1.6.1.x before 1.6.1.11; Business Edition B.x.x before B.2.5.13, C.2.x.x before C.2.4.6, and C.3.x.x before C.3.2.3; and s800i 1.3.x before 1.3.0.6 allows remote attackers to cause a denial of service (daemon crash) via an RTP comfort noise payload with a long data length."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "37153",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/37153"
            },
            {
              "name": "20091130 AST-2009-010: RTP Remote Crash Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/508147/100/0/threaded"
            },
            {
              "name": "37677",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37677"
            },
            {
              "name": "1023249",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1023249"
            },
            {
              "name": "DSA-1952",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1952"
            },
            {
              "name": "asterisk-rtp-comfortnoise-dos(54471)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54471"
            },
            {
              "name": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.4.diff.txt",
              "refsource": "CONFIRM",
              "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.4.diff.txt"
            },
            {
              "name": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.6.0.diff.txt",
              "refsource": "CONFIRM",
              "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.6.0.diff.txt"
            },
            {
              "name": "37530",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37530"
            },
            {
              "name": "FEDORA-2009-12461",
              "refsource": "FEDORA",
              "url": "http://www.redhat.com/archives/fedora-package-announce/2009-December/msg00759.html"
            },
            {
              "name": "https://issues.asterisk.org/view.php?id=16242",
              "refsource": "CONFIRM",
              "url": "https://issues.asterisk.org/view.php?id=16242"
            },
            {
              "name": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.6.1.diff.txt",
              "refsource": "CONFIRM",
              "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.6.1.diff.txt"
            },
            {
              "name": "37708",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37708"
            },
            {
              "name": "60569",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/60569"
            },
            {
              "name": "http://downloads.digium.com/pub/security/AST-2009-010.html",
              "refsource": "CONFIRM",
              "url": "http://downloads.digium.com/pub/security/AST-2009-010.html"
            },
            {
              "name": "ADV-2009-3368",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3368"
            },
            {
              "name": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.2.diff.txt",
              "refsource": "CONFIRM",
              "url": "http://downloads.asterisk.org/pub/security/AST-2009-010-1.2.diff.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-4055",
    "datePublished": "2009-12-02T11:00:00",
    "dateReserved": "2009-11-23T00:00:00",
    "dateUpdated": "2024-08-07T06:45:51.226Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2009-4055\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-12-02T11:30:00.517\",\"lastModified\":\"2024-11-21T01:08:49.793\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"rtp.c in Asterisk Open Source 1.2.x before 1.2.37, 1.4.x before 1.4.27.1, 1.6.0.x before 1.6.0.19, and 1.6.1.x before 1.6.1.11; Business Edition B.x.x before B.2.5.13, C.2.x.x before C.2.4.6, and C.3.x.x before C.3.2.3; and s800i 1.3.x before 1.3.0.6 allows remote attackers to cause a denial of service (daemon crash) via an RTP comfort noise payload with a long data length.\"},{\"lang\":\"es\",\"value\":\"rtp.c en Asterisk Open Source v1.2.x anterior a v1.2.37, v1.4.x anterior a v1.4.27.1, v1.6.0.x anterior a v1.6.0.19, y v1.6.1.x anterior a v1.6.1.11; Business Edition B.x.x anterior a B.2.5.13, C.2.x.x anterior a C.2.4.6, y C.3.x.x anterior a C.3.2.3; y s800i v1.3.x anterior a v1.3.0.6 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio) a trav\u00e9s una carga \u00fatil del RTP ruido de confort con una larga longitud de datos.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39358795-09A6-44C6-B969-1560CEF40057\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C2DAB51-91ED-43D4-AEA9-7C4661089BAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"A596A018-2FBC-4CEB-9910-756CC6598679\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"14BDCF8E-0B68-430A-A463-EE40C1A9AD65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA2CD93E-71A5-49EC-B986-5868C05553EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B66B213-4397-4435-8E48-8ED69AAE13D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55131A3D-C892-44EC-83D6-5888C57B11A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.2:netsec:*:*:*:*:*:*\",\"matchCriteriaId\":\"E017DD53-B8EC-4EA2-BF59-18C075C5771D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B940EEC6-4451-42B9-A56D-BDB8801B3685\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.3:netsec:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE4AB19F-1338-466D-AAD8-584C79FED1AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"175954A5-E712-41B8-BC11-4F999343063D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.10:netsec:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF5A2AA3-BB1F-4DEA-A369-183877BBDAC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DF9E41E-8FE6-4396-A5D4-D4568600FE03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.11:netsec:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B43C508-91E3-49C9-86F0-3643D8F2B7F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4457486F-E9B4-46B8-A05D-3B32F8B639A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.12:netsec:*:*:*:*:*:*\",\"matchCriteriaId\":\"0831E658-36AB-4A4B-9929-3DB6BE855A3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69417F54-D92F-46FB-9BFA-995211279C0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.12.1:netsec:*:*:*:*:*:*\",\"matchCriteriaId\":\"46A770C7-A7D4-44E3-A8B4-AC2189EAC3DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4611BEA0-25EC-4705-A390-6DF678373FF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.13:netsec:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BCD1F97-4B56-4DA8-A6EC-FA42A3CB9B97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53022458-F443-4402-AC52-FC3AE810E89E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"120B85AA-E9B8-4A4D-81CE-FD36CDB63074\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.15:netsec:*:*:*:*:*:*\",\"matchCriteriaId\":\"64D94742-7CA1-487B-90E8-5063FBF88925\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12302460-5D3F-4045-9DBF-606562E03BDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.16:netsec:*:*:*:*:*:*\",\"matchCriteriaId\":\"78546FDF-C843-4E48-ABEE-CC3514AA7C3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D6EBC0B-9842-44D1-B9D6-EFB88BE22879\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.17:netsec:*:*:*:*:*:*\",\"matchCriteriaId\":\"052969F1-6758-46E8-9273-E0F872BD65BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"624A0F00-4629-4550-847F-F24CC93DFF2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.18:netsec:*:*:*:*:*:*\",\"matchCriteriaId\":\"E473F645-F8B0-43FE-957B-F053427465DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10FC9AAB-1FAD-4953-A2FC-D42E9687D27E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.19:netsec:*:*:*:*:*:*\",\"matchCriteriaId\":\"460C9907-AA19-402A-85DE-D3CEA98B107B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD80F0D6-6B5B-41D3-AC41-F1643865088A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.20:netsec:*:*:*:*:*:*\",\"matchCriteriaId\":\"734D5198-53C1-40D3-B5BF-D74FC71FD3BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"788DEF5E-8A99-463D-89DC-0CC032271554\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.21:netsec:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0996D7A-9419-4897-A0AF-498AC3A2A81F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.21.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62D670E6-47E5-4B40-9217-F97D5F39C3EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.21.1:netsec:*:*:*:*:*:*\",\"matchCriteriaId\":\"94C23DB8-3C92-40FE-B8A6-ADF84D28510E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6CE7E4E-DA2D-4F03-A226-92965B40AE34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.22:netsec:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C59A947-457E-47EB-832E-3DA70CB52695\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55F74B56-B412-4AF1-AED0-C948AB6DC829\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.23:netsec:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B50ADDB-D3C2-407D-8844-F93866E5F20C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2775A7CC-2D88-4F2D-8C26-1E0DDDD681E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.24:netsec:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4149B59-E773-4ED8-A71D-EB7D00808819\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A0408C3-0FA7-4A17-9451-C4D46CDA8F27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.25:netsec:*:*:*:*:*:*\",\"matchCriteriaId\":\"1726090D-0C37-44A4-AD9B-7ED733B8702D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B92B045B-8CD6-4C04-9CCB-DCE9A44F6C12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.26:netsec:*:*:*:*:*:*\",\"matchCriteriaId\":\"54354E16-3238-43E8-BAA9-93CA7EB44D4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.26.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6867EED4-FC3B-4B72-88A5-DED96C729FE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.26.1:netsec:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A0867FC-7161-433F-A416-D7207C8D4D36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.26.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97BE6B60-3276-4580-843B-743D0D71E3DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.26.2:netsec:*:*:*:*:*:*\",\"matchCriteriaId\":\"36491B32-A405-4C5B-938F-9BEA50A8AF16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6141909B-EBC4-4726-AE9F-669C31257A5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"754A51AC-EF20-4736-ADDB-D2A70BCB79EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.28.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4600BB66-6DEB-444B-AF9E-BDD06CFD2876\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE089E31-3521-4D12-B81C-B6E386AE1409\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFE86E95-1110-46DF-9A7A-0E1AA56ACE4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.30.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B6DF5C5-85B4-4595-A69B-1DE70B5E0E41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.30.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F5E9888-16CD-4DB2-8889-CE4477559C71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.30.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C29C9A2C-6435-444E-A20B-5881F3798B85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.30.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E77A2569-CFAE-498D-A633-803849CFECE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D16E88E6-42D0-400E-AF43-111B35CE11E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.31.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE15A42E-030B-48F0-9498-1755DAAEDFB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39511726-1202-4179-9708-4D3B28496768\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A9A4328-F274-4591-A386-943FD6608374\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B4A8C9A-A475-4F02-A6BC-F17CEECBF0AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF11B38A-12D7-453A-870D-CDC2DE9313CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.2.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D69ACB7-CF9A-40B5-819E-58DA884D4E1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E56DB29-571D-4615-B347-38CF4590E463\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC1188DA-6C27-48D2-9CE7-74D77B24EE9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"A93B8F91-5C56-44DE-AE29-8468E853759F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF7F4D02-7C8E-403C-A53E-A5F8C07F33A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D85031A3-3444-4650-905D-721F1EBAA24F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F0AC2B3-6E8A-4B26-8A6C-792D9E5072C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BC8D6D4-A389-4A78-8DA8-351A9CB896E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E979AC4-58EA-4297-9F90-350924BBE440\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A58CCD3-4A0C-468B-85F2-59A52B7293A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3542DB91-8487-49D6-AA15-E8FD9D6B99D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BA4F3F1-C3F1-4E15-A854-9BB84E33E4AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"661D710E-79F0-4E98-B35B-ED0549D35C24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68291ADE-F9D1-427B-B150-FDA7F2F4788B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F80CBCB-F58D-4BE7-8E78-67E04C900D01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB61D32E-3400-480E-BD27-BA3F98F94427\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9154EDB-CAE6-4BB0-8D02-9EC2B81D93C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A432B0A7-F158-4B9C-97F6-6A29DB13EAFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"687C67CB-46AF-40C2-8A02-081C7F78568A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E8D6EC0-A61E-4DBC-A0C7-864E9C4BDA1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EF7F65A-45FD-4586-901E-49B057100BB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"300F158E-ED27-46C8-85E4-AA0AA6B201DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB6F04C0-3226-4D2C-97A3-39999483C62C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30685A20-963A-48D4-B7D7-2C11C2C812AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C54C3AAC-4D5D-4661-86AB-6849982E8C67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.16.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F847916-89F1-4AA6-973D-6002C8B54EE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.16.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5359815E-671A-4DFD-9E99-8CF903A03C84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2EFBC9E-4DCA-43CB-93EB-6807E2383A98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98755B1B-CAD5-4AC5-8571-52E67C3A8274\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9D8C8FE-3D09-4F60-AD03-9D4439942141\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.19:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"902FBE4B-5237-43CD-8EB6-D2CAC0F30879\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.19:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"708DCACA-49EC-468D-81EC-CE5367F8A164\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.19:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA9E3314-7D23-414C-8187-16D807410B62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.19:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D824ED7B-BAB6-4C0F-A6B0-A75AB072EC0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.19.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A01CE63-F834-48B2-826D-2DAD1B4AE8C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.19.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88B9CC9D-3DC2-4674-BA52-4C6D4E2056C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43F1849F-1230-45E7-B6A3-D6FC72EB0F11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.20:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"873C9C7E-93A3-4269-B19C-AB33A21C1AC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.20:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"457F2112-7C5E-4953-8F4C-117925D486DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.20:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD15ADD6-D7FA-441A-A9BC-487BCC15F2A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.20.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"792A8901-B7B8-40E8-9258-6338B72770FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E6C8F78-0C00-45A5-8FEB-2A4BD5AC1A37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.21:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3E04247-C4EF-4C1B-B879-5C02986950D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.21:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E382FC8-4001-4058-9151-05AE98B4A35E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.21.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11FECE6B-B6A6-4DDA-9019-9A10B05EC1F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.21.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9813D27-0688-4989-99EB-1DC0F82D59F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4333904-9D21-4149-965F-F49F0A34BD85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.22:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7180626-F0FD-46F3-AD52-5C67525C4B46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.22:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"85A1E3A3-C157-4F3D-9477-F63771E7F627\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.22:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEE739CC-7A9C-489E-BFC0-6257129C043D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.22:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADC0E947-A95A-44ED-8DED-CC769FF00569\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.22:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE52BD9F-3728-455C-BC45-1A4DB926FFE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.22.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EF82D41-9222-42D3-ADAD-94B4F950C63F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.22.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AE9F181-A8E4-4700-A30F-211CDE251606\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B10AE4B-EC2D-4D5B-B842-50F5097A0650\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.23:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"83E854D0-17A2-473B-B7E8-41E6447C81DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.23:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"47169133-3854-4D8F-B79E-3CC77A166EF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.23:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6071601F-CF37-4E66-9D6D-AFC3434C18AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.23:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A575824-E005-4820-824A-4875594619E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.23.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"080C7089-5662-4A94-9842-C4A26095DA4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.23.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AE38697-0B16-4032-9234-CA263E4A9885\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCB18BE2-B073-429C-ABE7-B8305793DAE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.24:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA7216BA-A42F-4ED8-8086-B4FA483FDAB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.24.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB7D2048-CD61-46C0-830B-11976B275783\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DBA63FE-62AF-4F3D-B30C-550D17C4E35F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.25:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD0A0F19-020D-4578-9023-12B0CB646D9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.25.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96D5A1E3-FF0B-4C71-AA51-655D7106880D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5D425E6-E2E5-4452-9EAA-2697C1155784\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.26:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9855FA26-0930-4AC9-A920-B394F6916349\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.26:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBA21246-7DF4-41BC-998A-05D38FC97C8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.26:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE9A7984-22C9-4296-8E44-C010E67F193D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.26:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"51B2C42A-C252-4BD8-A908-8F30C2BF15E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.26:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"2137CEAD-0F19-43C5-A26D-1972564FCD8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.26:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7552466-B782-4F16-8561-A2A51E94FED4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.26.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2F8C82D-3031-4C62-89FA-3BF56EA29727\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.26.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3074CEA-46BD-4CAD-BF5C-10008A80E434\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E06848DE-6EE1-4FD0-A14F-39D41B2F3E75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.4.27:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"88FBC328-538A-4484-A342-1688D9669B9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8374B5D-DE7A-4C3C-A5FE-579B17006A54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7494CE2-D3CC-404D-BE61-09A2E1FB3E47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"06E48482-D9AF-4038-80DA-27D9B4907C0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BC3C441-290F-471A-BA19-6B1C4D72A670\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"632ED295-B67D-43CF-BF38-CCE04088BA08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"50F3835F-6F2B-4EA7-B111-3B3C26548BC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0:beta6:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DCF7BD2-7903-4DC5-ADDC-EFCDC58736C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0:beta7:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5BECFE0-286F-4DA1-8CA9-6CEE861C3012\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0:beta7.1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFFF3245-2D0F-46E3-A1D6-319086489DC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0:beta8:*:*:*:*:*:*\",\"matchCriteriaId\":\"C91F2524-99D1-4C4B-9A31-21C0FB8B4D5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0:beta9:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B1BC0FF-9DB6-4FCC-A845-053943CF0D24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"419D4D16-E790-4872-B9AF-1320978768C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"73D30BA6-1EE0-4C3F-8F69-65C698A1B9A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"D39FA25D-AB56-470D-94AB-14446DB7D475\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4225252F-5960-4A42-A575-00C125860E89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A65D76A8-BBDD-4BDE-B789-D745C400DCBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8B0F5A5-4252-4A9C-B830-2419E87AE5A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9085056-3BE9-4309-9601-9CA0569BC215\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0.4:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8432455-9064-479F-B060-BF2A74ECC3EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E8EF2D7-371B-4268-989E-25225CC1F7B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABAC4CE9-1CFA-4279-B0CE-18F3C6FB9AB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E16E37A0-F739-4EEE-A1BB-EBC558C62767\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF0E2562-D0FC-404C-B725-617AEEF20AB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C831EC2A-C99D-4FB1-8E5C-2FF685792F2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F37C4158-6C4E-448D-929B-288480748289\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BBA9D27-E3DC-45CE-B56B-2C6781AA6A16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0.11:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"14CD1CCD-DFF2-4813-B56F-EA1C78AA818E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0.11:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4499411B-C92E-47F3-A6F2-8C9011B1CBCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57325096-F4D8-4146-A6FD-93219F2C72D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0.14:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9684FD88-7422-4272-B9BC-D8638B1AA0B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"648639A2-26C4-4EDA-A982-25D400836696\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F9F6FF8-8B88-4A02-B23A-0CADA8CE316E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0.16:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"37DE011D-1C1B-46AC-9265-F82693CE3C9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0.16:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"790BF14A-0193-4A5C-802B-D82200B22342\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15C4C10F-BD36-491A-87E7-2F072796DA33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8FE4BCF-9AE7-4F41-BA84-E9537CC1EBE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F25B0D15-7C09-4BBB-AC84-A1898F448DB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F259057F-3720-45D8-91B4-70A11B759794\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A106C460-4CE2-4AC3-B2FD-310F05507511\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.0:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E119FF9-2AD3-450D-8BBF-C6DD063246EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"759221D5-FC37-446D-9628-233B8D0B9120\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F82D4812-0429-42D4-BD27-C76CB9E7C368\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8FE11D6-8C0A-450E-B6DA-3AFE04D82232\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D1FBCC8-4637-4A67-BFFD-C052C3C03C12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7307E10-9FA5-4940-B837-7936384F61DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.5:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D0DC9D6-D4D6-46CB-98DA-F4FC1835B6B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBBD0747-F3FF-46D8-A3C4-8268E37BC5AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.7:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F759F27-008E-47FB-AC0A-EF11DA19918E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.7:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D15C82BA-BD1F-4A19-A907-E6C30042F537\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E802481-C8BD-4218-8CDC-5DB112DA946C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93C020CD-D0EA-4B3E-B33C-F900B08B28FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.10:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0004AADE-1652-4242-A97D-E9818FE03CCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.10:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"543E9C91-60FE-43AE-9B94-08DD730BA814\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.10:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"252849FA-F46E-4F5A-A488-AA53574CA884\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:digium:s800i:1.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"565444DE-F67C-4B6E-AC1E-92FC0D8A87CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:digium:s800i:1.3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E356B2-4AEA-4532-A6F8-13B814BEB2C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:digium:s800i:1.3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60F261AB-3172-4245-8090-744294A0D08A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:digium:s800i:1.3.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3DD6B08-D77D-4275-8F91-2CA47FF6E363\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:b:-:business:*:*:*:*:*\",\"matchCriteriaId\":\"564A4529-997D-4615-BED8-AE3FB159689A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:b.1.3.2:-:business:*:*:*:*:*\",\"matchCriteriaId\":\"FE9D66C4-F49D-4EC4-B5A9-24F28726A9B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:b.1.3.3:-:business:*:*:*:*:*\",\"matchCriteriaId\":\"BEFA5054-D5F9-4D07-9A66-D7AAD6953F5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:b.2.2.0:-:business:*:*:*:*:*\",\"matchCriteriaId\":\"D110DCEB-F2F9-4600-B49F-22952C71B785\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:b.2.2.1:-:business:*:*:*:*:*\",\"matchCriteriaId\":\"3333A119-D92F-433C-BF5D-0037199256C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:b.2.3.1:-:business:*:*:*:*:*\",\"matchCriteriaId\":\"19C44C33-EADA-48FD-A634-8066A003AFD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:b.2.3.2:-:business:*:*:*:*:*\",\"matchCriteriaId\":\"294A2BA2-26EB-40AD-B861-7FA9043CD097\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:b.2.3.3:-:business:*:*:*:*:*\",\"matchCriteriaId\":\"4FAC61AF-BDF2-4397-A8F8-9D9155836E4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:b.2.3.4:-:business:*:*:*:*:*\",\"matchCriteriaId\":\"33DE61C2-8C6A-4CD3-8D56-E70C4356CD50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:b.2.3.5:-:business:*:*:*:*:*\",\"matchCriteriaId\":\"EECB5F75-BCE2-4777-933E-25EB5657750C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:b.2.3.6:-:business:*:*:*:*:*\",\"matchCriteriaId\":\"B5D51557-3E67-4C9A-9753-472D13FCA5C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:b.2.5.0:-:business:*:*:*:*:*\",\"matchCriteriaId\":\"C063FCFA-B1C3-4ACB-B9E7-B3FC973FD898\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:b.2.5.1:-:business:*:*:*:*:*\",\"matchCriteriaId\":\"761DB3A3-1540-4976-AEB2-F8E45CCCC5E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:b.2.5.2:-:business:*:*:*:*:*\",\"matchCriteriaId\":\"B53CD2C1-9BF0-42F9-B3E3-2C9915E531C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:b.2.5.3:-:business:*:*:*:*:*\",\"matchCriteriaId\":\"947F58B8-21AF-460B-8203-D2605A1F91D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:c:-:business:*:*:*:*:*\",\"matchCriteriaId\":\"7CD989BE-8FA0-4EDB-8442-C2E12BD01D27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:c.2.3:-:business:*:*:*:*:*\",\"matchCriteriaId\":\"3FA908BA-BEF8-44A5-AC95-E7CF020D0C94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:c.3.0:-:business:*:*:*:*:*\",\"matchCriteriaId\":\"78E8936C-033B-49E6-BB39-D5BBBC80EB55\"}]}]}],\"references\":[{\"url\":\"http://downloads.asterisk.org/pub/security/AST-2009-010-1.2.diff.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://downloads.asterisk.org/pub/security/AST-2009-010-1.4.diff.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://downloads.asterisk.org/pub/security/AST-2009-010-1.6.0.diff.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://downloads.asterisk.org/pub/security/AST-2009-010-1.6.1.diff.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://downloads.digium.com/pub/security/AST-2009-010.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37530\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37677\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/37708\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1023249\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1952\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/60569\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/archives/fedora-package-announce/2009-December/msg00759.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/508147/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/37153\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/3368\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/54471\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://issues.asterisk.org/view.php?id=16242\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://downloads.asterisk.org/pub/security/AST-2009-010-1.2.diff.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://downloads.asterisk.org/pub/security/AST-2009-010-1.4.diff.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://downloads.asterisk.org/pub/security/AST-2009-010-1.6.0.diff.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://downloads.asterisk.org/pub/security/AST-2009-010-1.6.1.diff.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://downloads.digium.com/pub/security/AST-2009-010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37530\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37677\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/37708\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1023249\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1952\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/60569\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/archives/fedora-package-announce/2009-December/msg00759.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/508147/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/37153\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/3368\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/54471\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://issues.asterisk.org/view.php?id=16242\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.