cve-2017-7617
Vulnerability from cvelistv5
Published
2017-04-10 14:00
Modified
2024-08-05 16:12
Severity ?
EPSS score ?
Summary
Remote code execution can occur in Asterisk Open Source 13.x before 13.14.1 and 14.x before 14.3.1 and Certified Asterisk 13.13 before 13.13-cert3 because of a buffer overflow in a CDR user field, related to X-ClientCode in chan_sip, the CDR dialplan function, and the AMI Monitor action.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://downloads.asterisk.org/pub/security/AST-2017-001.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/97377 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://bugs.debian.org/859910 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://downloads.asterisk.org/pub/security/AST-2017-001.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/97377 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.debian.org/859910 | Patch, Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:12:27.196Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "97377", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/97377" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.debian.org/859910" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.asterisk.org/pub/security/AST-2017-001.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-04-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Remote code execution can occur in Asterisk Open Source 13.x before 13.14.1 and 14.x before 14.3.1 and Certified Asterisk 13.13 before 13.13-cert3 because of a buffer overflow in a CDR user field, related to X-ClientCode in chan_sip, the CDR dialplan function, and the AMI Monitor action." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-04-11T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "97377", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/97377" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.debian.org/859910" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.asterisk.org/pub/security/AST-2017-001.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-7617", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Remote code execution can occur in Asterisk Open Source 13.x before 13.14.1 and 14.x before 14.3.1 and Certified Asterisk 13.13 before 13.13-cert3 because of a buffer overflow in a CDR user field, related to X-ClientCode in chan_sip, the CDR dialplan function, and the AMI Monitor action." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "97377", "refsource": "BID", "url": "http://www.securityfocus.com/bid/97377" }, { "name": "https://bugs.debian.org/859910", "refsource": "CONFIRM", "url": "https://bugs.debian.org/859910" }, { "name": "http://downloads.asterisk.org/pub/security/AST-2017-001.html", "refsource": "CONFIRM", "url": "http://downloads.asterisk.org/pub/security/AST-2017-001.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-7617", "datePublished": "2017-04-10T14:00:00", "dateReserved": "2017-04-10T00:00:00", "dateUpdated": "2024-08-05T16:12:27.196Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2017-7617\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-04-10T14:59:00.327\",\"lastModified\":\"2024-11-21T03:32:17.860\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Remote code execution can occur in Asterisk Open Source 13.x before 13.14.1 and 14.x before 14.3.1 and Certified Asterisk 13.13 before 13.13-cert3 because of a buffer overflow in a CDR user field, related to X-ClientCode in chan_sip, the CDR dialplan function, and the AMI Monitor action.\"},{\"lang\":\"es\",\"value\":\"La ejecuci\u00f3n remota de c\u00f3digo puede ocurrir en Asterisk Open Source 13.x en versiones anteriores a 13.14.1 y 14.x en versiones anteriores a 14.3.1 y Asterisk certificado 13.13 en versiones anteriores a 13.13-cert3 debido a un desbordamiento de b\u00fafer en un campo de usuario de CDR, relacionado con X-ClientCode en chan_sip , La funci\u00f3n de dialplan CDR y la acci\u00f3n Monitor AMI.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:P/A:P\",\"baseScore\":6.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.0.0:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"E7D1238A-A8D2-485E-81FD-46038A883EC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.0.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E93A7967-9A04-424A-BDDB-A2B8289B9AC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.0.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F75C9FF-6F95-4F6A-B683-FE2BEDE3AD10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.0.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"68226156-42ED-4F0E-93E1-02DD57E582B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB2C4E1E-6B90-4DCC-BC09-7D19FBA65C3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4EB385E-28B5-4259-9431-99E1F32D61B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58C0FF1B-6188-4181-A139-1806328762BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.1.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"890EBB8C-989B-4344-AC03-62B399076008\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.1.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD4AAECB-A2BC-45BA-BC63-E51C1FE6C334\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"121EACD3-D5E3-4691-8024-95996865BB65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"136D6508-660E-410D-829A-7DD452BF8819\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.2.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEC2B3AA-EB24-4259-BED1-5DBC102FE9C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74B23D17-7356-4D37-8C73-E87896D1335B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.3.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEA9DA4A-A3E6-4C46-9471-CCBFA71083AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81A8A6CB-D236-4AB3-8476-C2D34DB7EF31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"599833A2-CBE9-479B-8A6E-AF79C5EED1DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.4.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B55719B3-7325-47E1-8D16-3F34B1F44385\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B870B3B7-E8DC-45A2-8FA4-657D005D00E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.5.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C91E9A3B-54EB-4819-94DD-30F7D0C90047\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.6.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"47189DF9-8E57-4BA6-9F52-B7A8229AE02A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.7.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"84AAFA3C-3CCD-4615-9725-169C303CF18F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.7.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C92E0801-9E8F-4CF2-A4A0-48BCF550F2D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C1C39FA-EF1A-4F2B-87A0-A00BAE73C6A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"677D1211-0B07-47B9-AB7A-E820E2B29561\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84202BAF-29E1-472B-B11F-B73F6A8891CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.8.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFC7120D-E6A0-4801-A1CC-3E143896EE72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAF2A83D-D9AE-441D-8D4E-335BF9D28A63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F5C1479-A540-4B7D-B00C-BD35EEC83BB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC12556C-5E82-47D7-87E5-FBDC01A920DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"461C1D2D-C4C1-4FF8-8231-38A2505F3523\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66595711-8573-4A9B-A8FE-4943E3097AA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.10.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D1FE3D4-A0B9-475A-9B89-B0222283A6A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9670B5AC-CBD1-484C-90F8-69B1A60B6054\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE5794B6-246C-415E-8E20-56447F152488\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E726CA39-A763-4422-B59E-E9E12518EA4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A96EB57-835A-45B4-82F5-31F925A85629\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"206F1DC9-9E8F-4497-A354-4A14711993DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D428364-E2AD-4BC6-9329-71793BC0EB61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08963910-E0BD-4487-B669-60E0BFA79863\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86B16D04-3808-4380-8F64-0C36B185C1F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.13.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3BD16A9-24BC-4FC1-81BA-A6D1FEF38D35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:13.14.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDC383B3-27EF-4C37-94BE-F0D41B34CAFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:14.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C949D5F5-6C0B-4B17-85B6-3A77D08CF967\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:14.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D413741-BDB7-496D-A01B-75E2A98FDB5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:14.0.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"29130F7F-DE00-43E1-A4A6-8F1F95D5CB19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:14.0.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"25E94EC0-F577-4B2B-8B11-DC76278CDD42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:14.0.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"101AD474-9B89-483D-84E8-08012677C55C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:14.0.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D57E41F6-C2CF-4183-A78A-9531A88FB65D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:14.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB1F9BB8-F951-427E-B770-69C2ACEBDB28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:14.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C4CE405-E923-4C9C-849A-D1031C4DB493\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C039C0CE-9C9C-4D85-8D7C-574DCF9D920B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:14.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1B2F2CC-18C3-46E7-8E7F-970622A710C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:14.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04ECDFF1-9718-4FAE-B45B-4F8CCA82829E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:14.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2C4DA60-5701-4BD0-B2F9-D93B9E64111F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:14.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B12834D-2AF1-4AD1-AB23-859CAA5D3210\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:14.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89036D04-EA04-4041-9694-6768478D35F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:14.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B19070D3-9F03-43C7-9F31-9A54BD5F2441\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:14.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E39BAA74-50A8-4087-8FF8-7C5922121319\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:14.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D29C253-B403-4B00-A626-3E3A920DC018\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:14.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E9D8FA2-21EA-4384-8001-118DA7C959F0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:certified_asterisk:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"13.13-cert2\",\"matchCriteriaId\":\"8C30F0A0-EE30-496A-ACF0-A9B1BCA46D73\"}]}]}],\"references\":[{\"url\":\"http://downloads.asterisk.org/pub/security/AST-2017-001.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/97377\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugs.debian.org/859910\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://downloads.asterisk.org/pub/security/AST-2017-001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/97377\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugs.debian.org/859910\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.