fkie_cve-2011-1174
Vulnerability from fkie_nvd
Published
2011-03-31 22:55
Modified
2024-11-21 01:25
Severity ?
Summary
manager.c in Asterisk Open Source 1.6.1.x before 1.6.1.24, 1.6.2.x before 1.6.2.17.2, and 1.8.x before 1.8.3.2 allows remote attackers to cause a denial of service (CPU and memory consumption) via a series of manager sessions involving invalid data.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "DBFF2686-0F5C-4F20-AA93-6B63C5ADCD82", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1:beta1:*:*:*:*:*:*", "matchCriteriaId": "6D4A9B22-7978-44F3-A30C-65FE7024AB6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1:beta2:*:*:*:*:*:*", "matchCriteriaId": "06219062-9CAD-49D2-823E-E11E74B131D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1:beta3:*:*:*:*:*:*", "matchCriteriaId": "91420C0D-C63B-4916-8335-6BE24EB738FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1:beta4:*:*:*:*:*:*", "matchCriteriaId": "FD1D7D08-AC94-49AC-9F16-A6E91F1F1EEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "05FDA8EA-6610-4D49-9825-34EBFAAD2691", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B8FE4BCF-9AE7-4F41-BA84-E9537CC1EBE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F25B0D15-7C09-4BBB-AC84-A1898F448DB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F259057F-3720-45D8-91B4-70A11B759794", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "A106C460-4CE2-4AC3-B2FD-310F05507511", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "3E119FF9-2AD3-450D-8BBF-C6DD063246EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "759221D5-FC37-446D-9628-233B8D0B9120", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F82D4812-0429-42D4-BD27-C76CB9E7C368", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8FE11D6-8C0A-450E-B6DA-3AFE04D82232", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "5D1FBCC8-4637-4A67-BFFD-C052C3C03C12", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "F7307E10-9FA5-4940-B837-7936384F61DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "3D0DC9D6-D4D6-46CB-98DA-F4FC1835B6B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBBD0747-F3FF-46D8-A3C4-8268E37BC5AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.7:rc1:*:*:*:*:*:*", "matchCriteriaId": "3F759F27-008E-47FB-AC0A-EF11DA19918E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.7:rc2:*:*:*:*:*:*", "matchCriteriaId": "D15C82BA-BD1F-4A19-A907-E6C30042F537", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "2E802481-C8BD-4218-8CDC-5DB112DA946C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "D6FC8A53-E3C0-4660-BE75-2B5B8B4F8160", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "93C020CD-D0EA-4B3E-B33C-F900B08B28FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:rc1:*:*:*:*:*:*", "matchCriteriaId": "0004AADE-1652-4242-A97D-E9818FE03CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:rc2:*:*:*:*:*:*", "matchCriteriaId": "543E9C91-60FE-43AE-9B94-08DD730BA814", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.10:rc3:*:*:*:*:*:*", "matchCriteriaId": "252849FA-F46E-4F5A-A488-AA53574CA884", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "9EB89B4F-9546-4DF0-B69F-1B9F289BB1E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "2E254415-1D59-4A77-80FB-AE3EF10FBB32", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.12:rc1:*:*:*:*:*:*", "matchCriteriaId": "DF2407D0-C324-45C4-9FBB-4294F747DBDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "F23A36CC-9AA2-4559-946D-6D0621664342", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.13:rc1:*:*:*:*:*:*", "matchCriteriaId": "89C40652-E180-416A-B88A-E6313530E98A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "A28C2C5D-A573-4036-A600-BE28A3E417B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.15:rc2:*:*:*:*:*:*", "matchCriteriaId": "EE162390-359F-4C5D-902B-275FB1FC3EF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "4A0A3750-0D34-4FB5-B897-17CA0D0B7CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "D11BE58D-5B7E-4BB5-988A-7FC2E4B92C4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "22631AE6-5DA1-46C6-A239-C232DA0D0E7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.18:rc1:*:*:*:*:*:*", "matchCriteriaId": "9F5CB8CC-4CC1-4A1B-8AD1-C876D1BC80EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.18:rc2:*:*:*:*:*:*", "matchCriteriaId": "8591DB43-EAA0-4D58-BA23-EAD916DEA3DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "4E4747F8-1AFC-4AEF-82D8-D6604FB5222E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.19:rc1:*:*:*:*:*:*", "matchCriteriaId": "B82172C9-EA5B-4FC9-A445-0A297AE56FF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.19:rc2:*:*:*:*:*:*", "matchCriteriaId": "0C71CDAB-A299-4F1D-942D-851C899E63BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.19:rc3:*:*:*:*:*:*", "matchCriteriaId": "E2FA9AB9-4C83-45A3-9772-3A16030DBF1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "A88C639A-9229-4D99-9087-1B0B95539BD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.20:rc1:*:*:*:*:*:*", "matchCriteriaId": "0B7DE987-7351-495A-8776-37E6B7BF0C0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.20:rc2:*:*:*:*:*:*", "matchCriteriaId": "CB5823CC-941F-47AB-AD1F-325181D40E60", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "712AF374-846D-4F21-91C4-1BA9AB33E46D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "E431AF4E-C6A8-424F-9205-01F5FDFB3306", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "52BE29C5-C2C3-4414-A8E1-4D4D926F6E65", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1F8B700A-FACB-4BC8-9DF2-972DC63D852B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FFD31B9B-2F43-4637-BE56-47A807384BF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "E6450D6B-C907-49E6-9788-E4029C09285F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "DDB0432E-024A-4C0C-87FF-448E513D2834", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "D6A6A343-FEA2-49E5-9858-455AE3B29470", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc6:*:*:*:*:*:*", "matchCriteriaId": "D57B94E3-EA37-466C-ADC4-5180D4502FDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc7:*:*:*:*:*:*", "matchCriteriaId": "64D35A89-6B21-4770-AA0F-424C5C91A254", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.0:rc8:*:*:*:*:*:*", "matchCriteriaId": "14817302-A34A-4980-B148-AEB4B3B49BE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "61FDFA96-E62A-413B-9846-F51F1F7349EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "DA924386-49F6-4371-B975-B1473EEA12F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "B74A1B99-8901-4690-B994-1DAD3EFA5ABB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "4253C7DD-3588-4B35-B96D-C027133BE93F", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "24AE11DB-16D3-42BF-BC64-E8982107D35B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "53841D77-926C-4362-BC85-BD8B6AC4391D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "F98FD6E6-EDE9-437D-B7C2-2DB65B73D230", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "4BA6CA77-D358-4623-8400-78EFC47ADB7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "B4E62DAB-45E0-4EAA-8E45-6D3757A679D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.15:rc1:*:*:*:*:*:*", "matchCriteriaId": "1355578C-B384-401A-9123-2789CBECAD0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "3491F8DB-A162-4608-B5F9-5401FE058CEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16:rc1:*:*:*:*:*:*", "matchCriteriaId": "C52730A8-D96E-46C1-8905-1D78A93E9C84", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "C6E5CD17-B14A-4BDB-BA75-261344FF6F25", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "EEED6C07-CFB7-44DC-9A41-9B6271942123", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:rc1:*:*:*:*:*:*", "matchCriteriaId": "0864DAF9-B7FA-4018-99F4-F2A7AA6FBBB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:rc2:*:*:*:*:*:*", "matchCriteriaId": "694B257B-E73B-4534-B316-87284FA45534", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17:rc3:*:*:*:*:*:*", "matchCriteriaId": "418FD91F-014E-4529-8D72-D3FB27788EEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.6.2.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "D213EC93-0D4F-4BD9-9F13-9A9E705135EB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6344E43-E8AA-4340-B3A7-72F5D6A5D184", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "4C170C1C-909D-4439-91B5-DB1A9CD150C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EE821BE5-B1D3-4854-A700-3A83E5F15724", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "149C57CA-0B4B-4220-87FC-432418D1C393", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "035595D5-BBEC-4D85-AD7A-A2C932D2BA70", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "6DAF5655-F09F-47F8-AFA6-4B95F77A57F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F8E001D8-0A7B-4FDD-88E3-E124ED32B81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9D5CFFBD-785F-4417-A54A-F3565FD6E736", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "D30EF999-92D1-4B19-8E32-1E4B35DE4EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "A67D156B-9C43-444F-ADEC-B21D99D1433C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "893EB152-6444-43DB-8714-9735354C873A", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8447EE7-A834-41D7-9204-07BD3752870C", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C04F2C9-5672-42F2-B664-A3EE4C954C29", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "33465668-4C91-4619-960A-D26D77853E53", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "CAD08674-0B44-44EA-940B-6812E2D5077D", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "EEE87710-A129-43AA-BA08-8001848975FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F582C6E-5DA0-4D72-A40E-66BDBC5CF2B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CEBB8-01B3-4A05-AFE8-37A143C9833E", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "2FAC47DD-B613-43E4-B9BF-6120B81D9789", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "86D20CB5-60E8-405E-B387-CF80C7DA5E07", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "71AB5A01-5961-4053-9111-CF32C6473A00", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*", "matchCriteriaId": "77D8E1DC-041F-4B87-AF9A-E0EC4D6A4BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7CCCB892-30CE-4BEF-904E-5D957F94D0EB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "manager.c in Asterisk Open Source 1.6.1.x before 1.6.1.24, 1.6.2.x before 1.6.2.17.2, and 1.8.x before 1.8.3.2 allows remote attackers to cause a denial of service (CPU and memory consumption) via a series of manager sessions involving invalid data." }, { "lang": "es", "value": "manager.c en Asterisk Open Source v1.6.1.x anterior a v1.6.1.24, v1.6.2.x anterior a v1.6.2.17.2, y v1.8.x anterior a v1.8.3.2 permite a atacantes remotos generar una denegaci\u00f3n de servicio (agotamiento de memoria y CPU) mediante una conjunto de sesiones que comprenden datos no v\u00e1lidos." } ], "id": "CVE-2011-1174", "lastModified": "2024-11-21T01:25:43.227", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-03-31T22:55:03.147", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2011-003.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056945.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057156.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057163.html" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2011/03/17/5" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2011/03/21/12" }, { "source": "secalert@redhat.com", "url": "http://securitytracker.com/id?1025223" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2011/dsa-2225" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/46897" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0686" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0790" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=688675" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66139" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2011-003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056945.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057156.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057163.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2011/03/17/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2011/03/21/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1025223" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2225" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46897" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0686" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0790" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=688675" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66139" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.