CVE-2011-1174
Vulnerability from cvelistv5
Published
2011-03-31 22:00
Modified
2024-08-06 22:21
Severity ?
EPSS score ?
Summary
manager.c in Asterisk Open Source 1.6.1.x before 1.6.1.24, 1.6.2.x before 1.6.2.17.2, and 1.8.x before 1.8.3.2 allows remote attackers to cause a denial of service (CPU and memory consumption) via a series of manager sessions involving invalid data.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:21:33.497Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2011-3945", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057156.html" }, { "name": "DSA-2225", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2225" }, { "name": "FEDORA-2011-3942", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057163.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=688675" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.asterisk.org/pub/security/AST-2011-003.html" }, { "name": "[oss-security] 20110317 CVE request for Asterisk flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/03/17/5" }, { "name": "46897", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46897" }, { "name": "asterisk-writes-dos(66139)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66139" }, { "name": "FEDORA-2011-3958", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056945.html" }, { "name": "ADV-2011-0686", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0686" }, { "name": "ADV-2011-0790", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0790" }, { "name": "1025223", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1025223" }, { "name": "[oss-security] 20110321 Re: CVE request for Asterisk flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/03/21/12" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-03-16T00:00:00", "descriptions": [ { "lang": "en", "value": "manager.c in Asterisk Open Source 1.6.1.x before 1.6.1.24, 1.6.2.x before 1.6.2.17.2, and 1.8.x before 1.8.3.2 allows remote attackers to cause a denial of service (CPU and memory consumption) via a series of manager sessions involving invalid data." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "FEDORA-2011-3945", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057156.html" }, { "name": "DSA-2225", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2225" }, { "name": "FEDORA-2011-3942", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057163.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=688675" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.asterisk.org/pub/security/AST-2011-003.html" }, { "name": "[oss-security] 20110317 CVE request for Asterisk flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/03/17/5" }, { "name": "46897", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46897" }, { "name": "asterisk-writes-dos(66139)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66139" }, { "name": "FEDORA-2011-3958", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056945.html" }, { "name": "ADV-2011-0686", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0686" }, { "name": "ADV-2011-0790", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0790" }, { "name": "1025223", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1025223" }, { "name": "[oss-security] 20110321 Re: CVE request for Asterisk flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/03/21/12" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-1174", "datePublished": "2011-03-31T22:00:00", "dateReserved": "2011-03-03T00:00:00", "dateUpdated": "2024-08-06T22:21:33.497Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2011-1174\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2011-03-31T22:55:03.147\",\"lastModified\":\"2024-11-21T01:25:43.227\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"manager.c in Asterisk Open Source 1.6.1.x before 1.6.1.24, 1.6.2.x before 1.6.2.17.2, and 1.8.x before 1.8.3.2 allows remote attackers to cause a denial of service (CPU and memory consumption) via a series of manager sessions involving invalid data.\"},{\"lang\":\"es\",\"value\":\"manager.c en Asterisk Open Source v1.6.1.x anterior a v1.6.1.24, v1.6.2.x anterior a v1.6.2.17.2, y v1.8.x anterior a v1.8.3.2 permite a atacantes remotos generar una denegaci\u00f3n de servicio (agotamiento de memoria y CPU) mediante una conjunto de sesiones que comprenden datos no v\u00e1lidos.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBFF2686-0F5C-4F20-AA93-6B63C5ADCD82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D4A9B22-7978-44F3-A30C-65FE7024AB6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"06219062-9CAD-49D2-823E-E11E74B131D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"91420C0D-C63B-4916-8335-6BE24EB738FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD1D7D08-AC94-49AC-9F16-A6E91F1F1EEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"05FDA8EA-6610-4D49-9825-34EBFAAD2691\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8FE4BCF-9AE7-4F41-BA84-E9537CC1EBE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F25B0D15-7C09-4BBB-AC84-A1898F448DB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F259057F-3720-45D8-91B4-70A11B759794\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A106C460-4CE2-4AC3-B2FD-310F05507511\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.0:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E119FF9-2AD3-450D-8BBF-C6DD063246EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"759221D5-FC37-446D-9628-233B8D0B9120\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F82D4812-0429-42D4-BD27-C76CB9E7C368\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8FE11D6-8C0A-450E-B6DA-3AFE04D82232\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D1FBCC8-4637-4A67-BFFD-C052C3C03C12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7307E10-9FA5-4940-B837-7936384F61DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.5:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D0DC9D6-D4D6-46CB-98DA-F4FC1835B6B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBBD0747-F3FF-46D8-A3C4-8268E37BC5AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.7:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F759F27-008E-47FB-AC0A-EF11DA19918E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.7:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D15C82BA-BD1F-4A19-A907-E6C30042F537\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E802481-C8BD-4218-8CDC-5DB112DA946C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6FC8A53-E3C0-4660-BE75-2B5B8B4F8160\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93C020CD-D0EA-4B3E-B33C-F900B08B28FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.10:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0004AADE-1652-4242-A97D-E9818FE03CCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.10:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"543E9C91-60FE-43AE-9B94-08DD730BA814\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.10:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"252849FA-F46E-4F5A-A488-AA53574CA884\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EB89B4F-9546-4DF0-B69F-1B9F289BB1E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E254415-1D59-4A77-80FB-AE3EF10FBB32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.12:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF2407D0-C324-45C4-9FBB-4294F747DBDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F23A36CC-9AA2-4559-946D-6D0621664342\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.13:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"89C40652-E180-416A-B88A-E6313530E98A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A28C2C5D-A573-4036-A600-BE28A3E417B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.15:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE162390-359F-4C5D-902B-275FB1FC3EF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A0A3750-0D34-4FB5-B897-17CA0D0B7CE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D11BE58D-5B7E-4BB5-988A-7FC2E4B92C4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22631AE6-5DA1-46C6-A239-C232DA0D0E7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.18:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F5CB8CC-4CC1-4A1B-8AD1-C876D1BC80EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.18:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8591DB43-EAA0-4D58-BA23-EAD916DEA3DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E4747F8-1AFC-4AEF-82D8-D6604FB5222E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.19:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B82172C9-EA5B-4FC9-A445-0A297AE56FF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.19:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C71CDAB-A299-4F1D-942D-851C899E63BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.19:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2FA9AB9-4C83-45A3-9772-3A16030DBF1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A88C639A-9229-4D99-9087-1B0B95539BD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.20:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B7DE987-7351-495A-8776-37E6B7BF0C0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.20:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB5823CC-941F-47AB-AD1F-325181D40E60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"712AF374-846D-4F21-91C4-1BA9AB33E46D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E431AF4E-C6A8-424F-9205-01F5FDFB3306\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.1.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52BE29C5-C2C3-4414-A8E1-4D4D926F6E65\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F8B700A-FACB-4BC8-9DF2-972DC63D852B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.2.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFD31B9B-2F43-4637-BE56-47A807384BF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.2.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6450D6B-C907-49E6-9788-E4029C09285F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.2.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDB0432E-024A-4C0C-87FF-448E513D2834\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.2.0:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6A6A343-FEA2-49E5-9858-455AE3B29470\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.2.0:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"D57B94E3-EA37-466C-ADC4-5180D4502FDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.2.0:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"64D35A89-6B21-4770-AA0F-424C5C91A254\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.2.0:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"14817302-A34A-4980-B148-AEB4B3B49BE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61FDFA96-E62A-413B-9846-F51F1F7349EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.2.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA924386-49F6-4371-B975-B1473EEA12F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B74A1B99-8901-4690-B994-1DAD3EFA5ABB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.2.3:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4253C7DD-3588-4B35-B96D-C027133BE93F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24AE11DB-16D3-42BF-BC64-E8982107D35B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53841D77-926C-4362-BC85-BD8B6AC4391D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F98FD6E6-EDE9-437D-B7C2-2DB65B73D230\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.2.6:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BA6CA77-D358-4623-8400-78EFC47ADB7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.2.6:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4E62DAB-45E0-4EAA-8E45-6D3757A679D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.2.15:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1355578C-B384-401A-9123-2789CBECAD0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.2.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3491F8DB-A162-4608-B5F9-5401FE058CEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.2.16:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C52730A8-D96E-46C1-8905-1D78A93E9C84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.2.16.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6E5CD17-B14A-4BDB-BA75-261344FF6F25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.2.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEED6C07-CFB7-44DC-9A41-9B6271942123\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.2.17:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0864DAF9-B7FA-4018-99F4-F2A7AA6FBBB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.2.17:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"694B257B-E73B-4534-B316-87284FA45534\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.2.17:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"418FD91F-014E-4529-8D72-D3FB27788EEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.6.2.17.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D213EC93-0D4F-4BD9-9F13-9A9E705135EB\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6344E43-E8AA-4340-B3A7-72F5D6A5D184\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C170C1C-909D-4439-91B5-DB1A9CD150C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE821BE5-B1D3-4854-A700-3A83E5F15724\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"149C57CA-0B4B-4220-87FC-432418D1C393\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"035595D5-BBEC-4D85-AD7A-A2C932D2BA70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DAF5655-F09F-47F8-AFA6-4B95F77A57F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8E001D8-0A7B-4FDD-88E3-E124ED32B81C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D5CFFBD-785F-4417-A54A-F3565FD6E736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D30EF999-92D1-4B19-8E32-1E4B35DE4EA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"A67D156B-9C43-444F-ADEC-B21D99D1433C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"893EB152-6444-43DB-8714-9735354C873A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8447EE7-A834-41D7-9204-07BD3752870C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C04F2C9-5672-42F2-B664-A3EE4C954C29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33465668-4C91-4619-960A-D26D77853E53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAD08674-0B44-44EA-940B-6812E2D5077D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEE87710-A129-43AA-BA08-8001848975FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F582C6E-5DA0-4D72-A40E-66BDBC5CF2B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E7CEBB8-01B3-4A05-AFE8-37A143C9833E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FAC47DD-B613-43E4-B9BF-6120B81D9789\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"86D20CB5-60E8-405E-B387-CF80C7DA5E07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"71AB5A01-5961-4053-9111-CF32C6473A00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"77D8E1DC-041F-4B87-AF9A-E0EC4D6A4BD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CCCB892-30CE-4BEF-904E-5D957F94D0EB\"}]}]}],\"references\":[{\"url\":\"http://downloads.asterisk.org/pub/security/AST-2011-003.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056945.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057156.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057163.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://openwall.com/lists/oss-security/2011/03/17/5\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://openwall.com/lists/oss-security/2011/03/21/12\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securitytracker.com/id?1025223\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2011/dsa-2225\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/46897\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0686\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0790\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=688675\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/66139\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://downloads.asterisk.org/pub/security/AST-2011-003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056945.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057156.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057163.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://openwall.com/lists/oss-security/2011/03/17/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://openwall.com/lists/oss-security/2011/03/21/12\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1025223\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2011/dsa-2225\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/46897\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0686\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0790\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=688675\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/66139\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.