fkie_cve-2014-9374
Vulnerability from fkie_nvd
Published
2014-12-12 15:59
Modified
2024-11-21 02:20
Severity ?
Summary
Double free vulnerability in the WebSocket Server (res_http_websocket module) in Asterisk Open Source 11.x before 11.14.2, 12.x before 12.7.2, and 13.x before 13.0.2 and Certified Asterisk 11.6 before 11.6-cert9 allows remote attackers to cause a denial of service (crash) by sending a zero length frame after a non-zero length frame.
References
Impacted products
Vendor Product Version
digium certified_asterisk 11.6
digium certified_asterisk 11.6
digium certified_asterisk 11.6
digium certified_asterisk 11.6
digium certified_asterisk 11.6
digium certified_asterisk 11.6
digium certified_asterisk 11.6
digium certified_asterisk 11.6
digium certified_asterisk 11.6.0
digium asterisk 11.0.0
digium asterisk 11.0.0
digium asterisk 11.0.0
digium asterisk 11.0.0
digium asterisk 11.0.0
digium asterisk 11.1.0
digium asterisk 11.1.0
digium asterisk 11.1.0
digium asterisk 11.1.0
digium asterisk 11.2.0
digium asterisk 11.2.0
digium asterisk 11.2.0
digium asterisk 11.3.0
digium asterisk 11.3.0
digium asterisk 11.4.0
digium asterisk 11.4.0
digium asterisk 11.4.0
digium asterisk 11.4.0
digium asterisk 11.4.0
digium asterisk 11.5.0
digium asterisk 11.5.0
digium asterisk 11.5.0
digium asterisk 11.6.0
digium asterisk 11.6.0
digium asterisk 11.6.0
digium asterisk 11.7.0
digium asterisk 11.7.0
digium asterisk 11.7.0
digium asterisk 11.8.0
digium asterisk 11.8.0
digium asterisk 11.8.0
digium asterisk 11.8.0
digium asterisk 11.9.0
digium asterisk 11.9.0
digium asterisk 11.9.0
digium asterisk 11.9.0
digium asterisk 11.10.0
digium asterisk 11.10.0
digium asterisk 11.11.0
digium asterisk 11.11.0
digium asterisk 11.12.0
digium asterisk 11.12.0
digium asterisk 11.13.0
digium asterisk 11.13.0
digium asterisk 11.14.0
digium asterisk 11.14.0
digium asterisk 11.14.0
digium asterisk 12.0.0
digium asterisk 12.1.0
digium asterisk 12.1.0
digium asterisk 12.1.0
digium asterisk 12.1.0
digium asterisk 12.2.0
digium asterisk 12.2.0
digium asterisk 12.2.0
digium asterisk 12.2.0
digium asterisk 12.3.0
digium asterisk 12.3.0
digium asterisk 12.3.0
digium asterisk 12.4.0
digium asterisk 12.4.0
digium asterisk 12.5.0
digium asterisk 12.5.0
digium asterisk 12.6.0
digium asterisk 12.6.0
digium asterisk 12.7.0
digium asterisk 12.7.0
digium asterisk 12.7.0
digium asterisk 12.7.1
digium asterisk 13.0.0
digium asterisk 13.0.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:lts:*:*:*",
              "matchCriteriaId": "6AD7C9B3-D029-4E05-8E80-3ADA904FAC1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:lts:*:*:*",
              "matchCriteriaId": "CE71221B-4D55-4643-B6D1-307B2CF41F98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:lts:*:*:*",
              "matchCriteriaId": "88124275-9BEB-4D53-9E4D-1AC8C52F2D0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert4:*:*:lts:*:*:*",
              "matchCriteriaId": "4F3CEFEF-72B6-4B58-81FE-01BCEEFB3013",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert5:*:*:lts:*:*:*",
              "matchCriteriaId": "AA637187-0EAE-4756-AD72-A0B2FABCA070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert6:*:*:lts:*:*:*",
              "matchCriteriaId": "6DAF6784-0B31-4104-9D85-473D5AFAB785",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert7:*:*:lts:*:*:*",
              "matchCriteriaId": "77B06B83-D62C-4A0E-BE94-83C9A02CE55A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6:cert8:*:*:lts:*:*:*",
              "matchCriteriaId": "CAD17809-CBB1-4E41-99C9-20FE56853563",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:certified_asterisk:11.6.0:*:*:*:lts:*:*:*",
              "matchCriteriaId": "D6EE9895-FB94-451D-8701-8C0DD8F5BED0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53B8453-F35A-49BE-8129-774BADF71BA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "CCB0C07E-DA2F-4169-848D-C3315CDC1CB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "410C43E6-5912-4C22-A592-7CF94402EEB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D50A355E-1B55-4DD2-8100-EB81AA6FC40E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "9ADF4230-EFEB-45EC-9C96-0262B4A3E459",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9B51588-50A2-40B2-A007-06F57D38C7AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CDE2B00C-6AC0-4166-8A25-EFC42CE7F737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "9FD404B4-2B0A-4D7A-8CF6-E2C6B4BACBB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "617FC4AF-D152-4EE1-828D-C2A6AD0DFD3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F31715AF-5A35-4D0B-8E01-BB6E4CB7E02F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1548C574-CD51-49F6-91B1-B06C504000E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D56C2C11-4B42-43AB-9DAE-61C15D107160",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.3.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "69F2DED4-39F5-44C8-BEA3-22692D28C631",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.3.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "AD172E70-238B-4B01-A922-8021B5627092",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C689A32B-E87D-492F-B3F6-7B80DFA049C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "5FB3863D-7F46-4C4A-9E6B-C255CDF0D953",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7239304D-C383-4F26-BB08-65ADD2380015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "1AC153C2-258E-4EE6-845F-8E8C68AA242D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.4.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "1453BB31-D674-4A05-AB2A-2502D127C3E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "229B7982-9775-42AA-B8F5-FE920CCAA497",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.5.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "326845DF-2DB2-406B-BE0F-877384DAACFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.5.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "E0FC2D46-FD1B-421F-8773-BB41B1E9A831",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "868865A1-E074-4DB0-A119-D24C5C53FEF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1794440C-7068-4673-9142-6221B8A39E5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.6.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "C5CF286B-3377-4AE9-A7B9-8535641D639A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "50EC8D9D-3483-4080-8000-496343BC8BFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.7.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "6695F632-6AC4-400F-B513-280304ABC1F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.7.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "A3423C40-240A-4237-8B0F-A4B4ED421C3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "24F62C78-2913-463F-B689-353AB2371E3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "87FCBE6A-C1CD-48EF-A435-4CEADD46C917",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "42E0E639-70A2-41EE-9B34-A9223D1958AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.8.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "32E84D64-0CB8-46BF-BD3F-8CA2E0CE4C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A276363F-F897-4E6D-9D55-5F5AA73DEE26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "38230656-6242-4D24-AA67-F42A6FA2FC7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "20ED9FC3-5E56-4AE7-903F-267CAE7F2CA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.9.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "84F88075-9935-45BF-88B7-21ACE8AAB314",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB16D9D6-A2F6-4C4B-B364-1B63B1FFB5F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.10.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "283793E4-0AE8-48D9-ABCF-70E44FE55C4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4EABFC3-24FA-4441-9F2B-650D90AE5CC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.11.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "3DA61A22-3DD0-46A3-8C13-F25F4F03FD35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2026FD07-103C-4691-AFA4-88C490382F28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.12.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "791700CD-E007-489E-9BC6-37025CAA8144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4061B4C7-8315-450C-866A-C4F3A6BCB1A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.13.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "C6EA7154-7F08-4E43-9270-E617632230AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC6047FB-D1BD-4E21-B6BC-E51374C4B0E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.14.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "2DC51129-8F38-4505-90FB-4FFDED45BABF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:11.14.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "4CA571E0-B513-47AA-95BE-EB4DD2AA91E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B446105E-6C8E-495A-BF83-A33CB33485A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B53364B-5278-46E9-961A-192CA334CB09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "3B4D6D24-A718-4962-AD4E-F19AFB03BFF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "BE2F0D0D-761C-4338-93F0-506E94E57000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "3D38DFCA-E357-4A28-8F03-FDADF40A5185",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F42C9442-9EBC-4CA5-AB1C-BA0662C27BDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "71762B58-A08B-405B-9596-6D15CF4A95D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "EA48C05A-E898-42EE-A699-94BBD66E5E0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:12.2.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "EDCB78F8-AAC8-44B1-BDF4-C73BC8951EC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:12.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D92FFF6-E7B2-4210-A652-79AC6B74002C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:12.3.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "DB5E92FB-9CF8-461E-A665-3407D265DF17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:12.3.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "536F6C10-3165-40F7-931A-23765AB87555",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:12.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "133288EC-8A78-4C9D-BF94-9900CD3D2260",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:12.4.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B2E54998-B257-478E-9E52-2BB4F4CD6429",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:12.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FD4498A-72BD-40EB-A332-DE10C87C1015",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:12.5.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "71961599-009C-42F4-AA26-9B16C39F3CBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:12.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B98A2EA6-DCC6-4F8B-B132-6692AED16CF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:12.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "672EDC0E-D70A-4BB0-B7FE-5D422C737862",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:12.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D41387EE-E8B6-4B4F-BC52-7FED09322A20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:12.7.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "8E9E50F8-0123-4C9E-88E1-5DCE08770B68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:12.7.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "F7C605A3-8517-4215-9AD3-980D587B22DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:12.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "866815AE-D1FE-460C-A3BC-70C251655C1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:13.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B635C21-C193-43AF-A139-98604F324ABF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:digium:asterisk:13.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB2C4E1E-6B90-4DCC-BC09-7D19FBA65C3F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Double free vulnerability in the WebSocket Server (res_http_websocket module) in Asterisk Open Source 11.x before 11.14.2, 12.x before 12.7.2, and 13.x before 13.0.2 and Certified Asterisk 11.6 before 11.6-cert9 allows remote attackers to cause a denial of service (crash) by sending a zero length frame after a non-zero length frame."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de doble liberaci\u00f3n en WebSocket Server (el m\u00f3dulo res_http_websocket) en Asterisk Open Source 11.x anterior a 11.14.2, 12.x anterior a 12.7.2, y 13.x anterior a 13.0.2 y Certified Asterisk 11.6 anterior a 11.6-cert9 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) mediante el envio de un Frame de longitud cero despu\u00e9s de un Frame de longitud no cero."
    }
  ],
  "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/415.html\"\u003eCWE-415: Double Free\u003c/a\u003e",
  "id": "CVE-2014-9374",
  "lastModified": "2024-11-21T02:20:43.697",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-12-12T15:59:14.883",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://advisories.mageia.org/MGASA-2015-0010.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://downloads.asterisk.org/pub/security/AST-2014-019.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://packetstormsecurity.com/files/129473/Asterisk-Project-Security-Advisory-AST-2014-019.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://seclists.org/fulldisclosure/2014/Dec/48"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/60251"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:018"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/534197/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/71607"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id/1031345"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://advisories.mageia.org/MGASA-2015-0010.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://downloads.asterisk.org/pub/security/AST-2014-019.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://packetstormsecurity.com/files/129473/Asterisk-Project-Security-Advisory-AST-2014-019.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/fulldisclosure/2014/Dec/48"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/60251"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:018"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/534197/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/71607"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1031345"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.