CVE-2012-1184
Vulnerability from cvelistv5
Published
2012-09-18 18:00
Modified
2024-08-06 18:53
Severity ?
Summary
Stack-based buffer overflow in the ast_parse_digest function in main/utils.c in Asterisk 1.8.x before 1.8.10.1 and 10.x before 10.2.1 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string in an HTTP Digest Authentication header.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:53:35.690Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20120316 Re: CVE Request -- Asterisk: AST-2012-002 and AST-2012-003  flaws",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/03/16/17"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://downloads.asterisk.org/pub/security/AST-2012-003.pdf"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.asterisk.org/node/51797"
          },
          {
            "name": "48417",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48417"
          },
          {
            "name": "[oss-security] 20120316 CVE Request -- Asterisk: AST-2012-002 and AST-2012-003  flaws",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/03/16/10"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://downloads.asterisk.org/pub/security/AST-2012-003-1.8.diff"
          },
          {
            "name": "80126",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80126"
          },
          {
            "name": "1026813",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1026813"
          },
          {
            "name": "asterisk-astparsedigest-bo(74083)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74083"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the ast_parse_digest function in main/utils.c in Asterisk 1.8.x before 1.8.10.1 and 10.x before 10.2.1 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string in an HTTP Digest Authentication header."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[oss-security] 20120316 Re: CVE Request -- Asterisk: AST-2012-002 and AST-2012-003  flaws",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/03/16/17"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://downloads.asterisk.org/pub/security/AST-2012-003.pdf"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.asterisk.org/node/51797"
        },
        {
          "name": "48417",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48417"
        },
        {
          "name": "[oss-security] 20120316 CVE Request -- Asterisk: AST-2012-002 and AST-2012-003  flaws",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/03/16/10"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://downloads.asterisk.org/pub/security/AST-2012-003-1.8.diff"
        },
        {
          "name": "80126",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80126"
        },
        {
          "name": "1026813",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1026813"
        },
        {
          "name": "asterisk-astparsedigest-bo(74083)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74083"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-1184",
    "datePublished": "2012-09-18T18:00:00",
    "dateReserved": "2012-02-14T00:00:00",
    "dateUpdated": "2024-08-06T18:53:35.690Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2012-1184\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2012-09-18T18:55:04.270\",\"lastModified\":\"2024-11-21T01:36:36.983\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Stack-based buffer overflow in the ast_parse_digest function in main/utils.c in Asterisk 1.8.x before 1.8.10.1 and 10.x before 10.2.1 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string in an HTTP Digest Authentication header.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de desboramiento de buffer basado en memoria din\u00e1mica en la funci\u00f3n ast_parse_digest en main/utils.c en Asterisk v1.8.x antes de v1.8.10.1 y v10.x antes de v10.2.1, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una cadena larga en una cabecera HTTP Digest Authentication\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6344E43-E8AA-4340-B3A7-72F5D6A5D184\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C170C1C-909D-4439-91B5-DB1A9CD150C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE821BE5-B1D3-4854-A700-3A83E5F15724\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"149C57CA-0B4B-4220-87FC-432418D1C393\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"035595D5-BBEC-4D85-AD7A-A2C932D2BA70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DAF5655-F09F-47F8-AFA6-4B95F77A57F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8E001D8-0A7B-4FDD-88E3-E124ED32B81C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D5CFFBD-785F-4417-A54A-F3565FD6E736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D30EF999-92D1-4B19-8E32-1E4B35DE4EA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"A67D156B-9C43-444F-ADEC-B21D99D1433C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C04F2C9-5672-42F2-B664-A3EE4C954C29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33465668-4C91-4619-960A-D26D77853E53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAD08674-0B44-44EA-940B-6812E2D5077D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEE87710-A129-43AA-BA08-8001848975FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F582C6E-5DA0-4D72-A40E-66BDBC5CF2B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E7CEBB8-01B3-4A05-AFE8-37A143C9833E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"522733A7-E89E-4BFD-AC93-D6882636E880\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FAC47DD-B613-43E4-B9BF-6120B81D9789\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"86D20CB5-60E8-405E-B387-CF80C7DA5E07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"71AB5A01-5961-4053-9111-CF32C6473A00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"77D8E1DC-041F-4B87-AF9A-E0EC4D6A4BD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CCCB892-30CE-4BEF-904E-5D957F94D0EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F156798F-F2EF-4366-B17E-03165AB437D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EFBB9A6-DD1D-436E-919F-74A3E4F40396\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"054E34C8-B6A5-48C7-938E-D3C268E0E8BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DCECA72-533A-4A95-AB19-20C5F09A1B01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E2309F8-AFEE-4150-99D1-BA606432ED73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"7785F282-BFA0-400A-8398-872ACCA4BF37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1278D3FB-78C6-4F7D-A845-0A93D4F6E2B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C00A6EFB-A848-46D3-AAD7-FD8140007E42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB6E3972-5C53-4B6D-BFE1-67E1122EA013\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"048617A0-A783-4519-A947-35220D4CD786\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD493A41-E686-444C-A34E-412804510F77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"87D25FD6-CC3A-4AB0-B7B1-67D07386F99D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C402E9E-09CC-4EFA-AC27-156437B05B22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8A41F9C-D2F4-47A9-80CD-2B1BF6B0CB63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"627FF5B9-E5A8-4DBC-A891-B175011E72A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6146EB2E-BA32-4408-B10B-A711EC39C580\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C863324-05AE-4FCA-BD2E-39040A468DCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A85F51E7-0AAE-4F3B-9F90-BD2E31255822\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"315FB0D4-D4A4-4369-BFB8-F2CAEB429015\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC74D6C5-F410-4B68-AF92-056B727193A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B70911F8-A526-4600-8198-03FF4CCB28DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA60A9C9-C2EF-4971-BEFB-FF687DAEF2F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.8.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAFB22FA-CC24-4AFE-AC83-2D044563F7CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.8.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"00F3EB0D-7C63-46B5-BA95-8486B9716C78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.8.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"00C1BF3B-7593-478D-9AAA-153901C70286\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.8.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"82423EC2-FA29-4AF6-86C3-6AC6DFDC4DC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.8.0:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F86406A-0936-4A06-88FB-4137A64498EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"672CE4C0-EBD6-470B-937E-810FF1C4CDBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88DB1105-74D8-4312-9D02-D1E21F2E785C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"404C0557-6229-4D90-BFDD-54AFFCCE6A19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.9.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D1D26CC-891F-4396-B7D7-30D712829E71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.9.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F25B61EA-F4D1-452A-9D96-B8DFDD719B0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.9.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9324AB96-EC99-4F04-A0A9-00F936C86EFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B8B5E76-4A74-4E88-8A6F-C23538B7642A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDB6BBCA-47CE-49B8-9706-AFDE4BE46550\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BFF65E2-692B-4C39-88FC-6DED8D9A7258\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5260E309-9320-4DB8-A918-7D215BF95D2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.10.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"60AFF340-A866-4CFE-9334-53B95FD4AA59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.10.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"74E50309-CD7D-41F7-97DA-A7E451D0796A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.10.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FD3F8F8-820E-4C29-9F8F-023D1DB999CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.10.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"C33A6419-0D00-49D6-9A48-2B633610AAED\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"687ED3CE-67C4-410D-8AF4-C769015598F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.0.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"30E918CD-89C4-42DA-9709-E50E0A3FA736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.0.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA57FA15-D0D7-4A97-9C25-6F6566940098\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.0.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1C45300-A2CF-40E7-AB67-23DC24C31A1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.0.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"958081DC-1D77-45CD-A940-C7A1AB42C7BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.0.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"298A879D-4F65-4523-A752-D17C4F81B822\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37AB07BE-54C4-4972-A05F-D1E2CF4363CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBC63564-A84E-463D-8312-DDF1C6B7796F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.1.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"62A0906E-B631-4F3A-9ABC-9A43A43220BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.1.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6314ADA-2849-416D-966E-C01C322EF904\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B6CB1DD-614A-4B3D-99AE-9B1341427024\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC95B04F-3746-4F1C-8428-A1FA10253E14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20819080-E0AB-4879-B4CF-A154D6F7EF6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6C45753-E2CC-4F7C-B8DA-3D8CF255EA22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.2.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A080197-D6AA-4FDC-888E-51D1C8251E34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.2.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F08D930-D4C1-4C63-875C-171C46AE97C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.2.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AA43D7D-AEAD-47CB-BFA5-B73004A1A7A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.2.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5ED5F6F-166D-4610-8939-A33AD45F1ADE\"}]}]}],\"references\":[{\"url\":\"http://downloads.asterisk.org/pub/security/AST-2012-003-1.8.diff\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://downloads.asterisk.org/pub/security/AST-2012-003.pdf\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://osvdb.org/80126\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/48417\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.asterisk.org/node/51797\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/03/16/10\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/03/16/17\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id?1026813\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/74083\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://downloads.asterisk.org/pub/security/AST-2012-003-1.8.diff\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://downloads.asterisk.org/pub/security/AST-2012-003.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://osvdb.org/80126\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/48417\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.asterisk.org/node/51797\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/03/16/10\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/03/16/17\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1026813\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/74083\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.