CVE-2012-2947 (GCVE-0-2012-2947)
Vulnerability from cvelistv5 – Published: 2012-06-02 15:00 – Updated: 2024-08-06 19:50
VLAI?
Summary
chan_iax2.c in the IAX2 channel driver in Certified Asterisk 1.8.11-cert before 1.8.11-cert2 and Asterisk Open Source 1.8.x before 1.8.12.1 and 10.x before 10.4.1, when a certain mohinterpret setting is enabled, allows remote attackers to cause a denial of service (daemon crash) by placing a call on hold.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T19:50:05.310Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "DSA-2493",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2012/dsa-2493"
},
{
"name": "1027102",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1027102"
},
{
"name": "20120529 AST-2012-007: Remote crash vulnerability in IAX2 channel driver.",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-05/0144.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://downloads.asterisk.org/pub/security/AST-2012-007.html"
},
{
"name": "49303",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/49303"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-05-29T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "chan_iax2.c in the IAX2 channel driver in Certified Asterisk 1.8.11-cert before 1.8.11-cert2 and Asterisk Open Source 1.8.x before 1.8.12.1 and 10.x before 10.4.1, when a certain mohinterpret setting is enabled, allows remote attackers to cause a denial of service (daemon crash) by placing a call on hold."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-06-23T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "DSA-2493",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2012/dsa-2493"
},
{
"name": "1027102",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1027102"
},
{
"name": "20120529 AST-2012-007: Remote crash vulnerability in IAX2 channel driver.",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-05/0144.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://downloads.asterisk.org/pub/security/AST-2012-007.html"
},
{
"name": "49303",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/49303"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-2947",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "chan_iax2.c in the IAX2 channel driver in Certified Asterisk 1.8.11-cert before 1.8.11-cert2 and Asterisk Open Source 1.8.x before 1.8.12.1 and 10.x before 10.4.1, when a certain mohinterpret setting is enabled, allows remote attackers to cause a denial of service (daemon crash) by placing a call on hold."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "DSA-2493",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2493"
},
{
"name": "1027102",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1027102"
},
{
"name": "20120529 AST-2012-007: Remote crash vulnerability in IAX2 channel driver.",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-05/0144.html"
},
{
"name": "http://downloads.asterisk.org/pub/security/AST-2012-007.html",
"refsource": "CONFIRM",
"url": "http://downloads.asterisk.org/pub/security/AST-2012-007.html"
},
{
"name": "49303",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49303"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-2947",
"datePublished": "2012-06-02T15:00:00",
"dateReserved": "2012-05-29T00:00:00",
"dateUpdated": "2024-08-06T19:50:05.310Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"036E8A89-7A16-411F-9D31-676313BB7244\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6344E43-E8AA-4340-B3A7-72F5D6A5D184\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C170C1C-909D-4439-91B5-DB1A9CD150C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE821BE5-B1D3-4854-A700-3A83E5F15724\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*\", \"matchCriteriaId\": \"149C57CA-0B4B-4220-87FC-432418D1C393\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*\", \"matchCriteriaId\": \"035595D5-BBEC-4D85-AD7A-A2C932D2BA70\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DAF5655-F09F-47F8-AFA6-4B95F77A57F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8E001D8-0A7B-4FDD-88E3-E124ED32B81C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D5CFFBD-785F-4417-A54A-F3565FD6E736\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"D30EF999-92D1-4B19-8E32-1E4B35DE4EA1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"A67D156B-9C43-444F-ADEC-B21D99D1433C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"893EB152-6444-43DB-8714-9735354C873A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8447EE7-A834-41D7-9204-07BD3752870C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C04F2C9-5672-42F2-B664-A3EE4C954C29\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33465668-4C91-4619-960A-D26D77853E53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CAD08674-0B44-44EA-940B-6812E2D5077D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EEE87710-A129-43AA-BA08-8001848975FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F582C6E-5DA0-4D72-A40E-66BDBC5CF2B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E7CEBB8-01B3-4A05-AFE8-37A143C9833E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"522733A7-E89E-4BFD-AC93-D6882636E880\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2FAC47DD-B613-43E4-B9BF-6120B81D9789\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"86D20CB5-60E8-405E-B387-CF80C7DA5E07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"71AB5A01-5961-4053-9111-CF32C6473A00\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"77D8E1DC-041F-4B87-AF9A-E0EC4D6A4BD8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7CCCB892-30CE-4BEF-904E-5D957F94D0EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F156798F-F2EF-4366-B17E-03165AB437D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9EFBB9A6-DD1D-436E-919F-74A3E4F40396\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"054E34C8-B6A5-48C7-938E-D3C268E0E8BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"1DCECA72-533A-4A95-AB19-20C5F09A1B01\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E2309F8-AFEE-4150-99D1-BA606432ED73\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"7785F282-BFA0-400A-8398-872ACCA4BF37\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1278D3FB-78C6-4F7D-A845-0A93D4F6E2B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C00A6EFB-A848-46D3-AAD7-FD8140007E42\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB6E3972-5C53-4B6D-BFE1-67E1122EA013\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"048617A0-A783-4519-A947-35220D4CD786\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD493A41-E686-444C-A34E-412804510F77\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"87D25FD6-CC3A-4AB0-B7B1-67D07386F99D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C402E9E-09CC-4EFA-AC27-156437B05B22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8A41F9C-D2F4-47A9-80CD-2B1BF6B0CB63\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"627FF5B9-E5A8-4DBC-A891-B175011E72A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"6146EB2E-BA32-4408-B10B-A711EC39C580\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C863324-05AE-4FCA-BD2E-39040A468DCE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A85F51E7-0AAE-4F3B-9F90-BD2E31255822\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"315FB0D4-D4A4-4369-BFB8-F2CAEB429015\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC74D6C5-F410-4B68-AF92-056B727193A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B70911F8-A526-4600-8198-03FF4CCB28DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA60A9C9-C2EF-4971-BEFB-FF687DAEF2F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.8.0:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"BAFB22FA-CC24-4AFE-AC83-2D044563F7CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.8.0:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"00F3EB0D-7C63-46B5-BA95-8486B9716C78\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.8.0:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"00C1BF3B-7593-478D-9AAA-153901C70286\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.8.0:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"82423EC2-FA29-4AF6-86C3-6AC6DFDC4DC5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.8.0:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F86406A-0936-4A06-88FB-4137A64498EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"672CE4C0-EBD6-470B-937E-810FF1C4CDBD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.8.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"88DB1105-74D8-4312-9D02-D1E21F2E785C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"404C0557-6229-4D90-BFDD-54AFFCCE6A19\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.9.0:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D1D26CC-891F-4396-B7D7-30D712829E71\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.9.0:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"F25B61EA-F4D1-452A-9D96-B8DFDD719B0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.9.0:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"9324AB96-EC99-4F04-A0A9-00F936C86EFA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.9.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B8B5E76-4A74-4E88-8A6F-C23538B7642A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.9.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BDB6BBCA-47CE-49B8-9706-AFDE4BE46550\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.9.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8BFF65E2-692B-4C39-88FC-6DED8D9A7258\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5260E309-9320-4DB8-A918-7D215BF95D2B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.10.0:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"60AFF340-A866-4CFE-9334-53B95FD4AA59\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.10.0:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"74E50309-CD7D-41F7-97DA-A7E451D0796A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.10.0:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"6FD3F8F8-820E-4C29-9F8F-023D1DB999CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.10.0:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"C33A6419-0D00-49D6-9A48-2B633610AAED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.10.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"447E07C9-4A25-418D-B53F-609B78EE4C21\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.11.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E8AE686-B618-4B0D-BD27-1F96295E964D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.11.0:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"E9751C0A-84F5-4A43-8282-12A9DE559569\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.11.0:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"F67E2694-F6F1-482C-91F2-D9FD856EA31B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.11.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E2D53AA-8D50-445F-9500-2F580F260DC0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D9D7D88-D64F-4F54-8C84-6AC45FBD36F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.12.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F67AB282-591C-4ED7-9750-C593A38D5D7B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.12.0:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9F8F881-2BF7-44AB-8756-54A06801EB11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.12.0:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"36EFF3C4-4D00-4BC5-94B9-403BB00C6AB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:1.8.12.0:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E434F10-395E-426E-A988-4CDA504577D0\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:10.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"687ED3CE-67C4-410D-8AF4-C769015598F3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:10.0.0:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"30E918CD-89C4-42DA-9709-E50E0A3FA736\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:10.0.0:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA57FA15-D0D7-4A97-9C25-6F6566940098\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:10.0.0:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1C45300-A2CF-40E7-AB67-23DC24C31A1D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:10.0.0:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"958081DC-1D77-45CD-A940-C7A1AB42C7BA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:10.0.0:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"298A879D-4F65-4523-A752-D17C4F81B822\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:10.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"37AB07BE-54C4-4972-A05F-D1E2CF4363CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:10.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EBC63564-A84E-463D-8312-DDF1C6B7796F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:10.1.0:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"62A0906E-B631-4F3A-9ABC-9A43A43220BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:10.1.0:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6314ADA-2849-416D-966E-C01C322EF904\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:10.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B6CB1DD-614A-4B3D-99AE-9B1341427024\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:10.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC95B04F-3746-4F1C-8428-A1FA10253E14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:10.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"20819080-E0AB-4879-B4CF-A154D6F7EF6F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:10.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6C45753-E2CC-4F7C-B8DA-3D8CF255EA22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:10.2.0:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A080197-D6AA-4FDC-888E-51D1C8251E34\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:10.2.0:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"1F08D930-D4C1-4C63-875C-171C46AE97C1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:10.2.0:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"1AA43D7D-AEAD-47CB-BFA5-B73004A1A7A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:10.2.0:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"B5ED5F6F-166D-4610-8939-A33AD45F1ADE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:10.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D40002A-564E-425C-BA2A-7C4A8F8DAFD7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:10.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"521C4DB2-7127-4BA9-94FC-AB0E9E06FE2B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:10.3.0:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C905DC1-8AB8-4D83-BB5B-FA4DABC58229\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:10.3.0:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"ECC74B5D-97A1-46FF-AFA3-5D5E4A0BF3A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:10.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2D98C7C-94A8-4348-AF22-04A41FB6F8EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:10.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85D39A99-E9A6-4860-BC61-56CA2FC3238B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:10.4.0:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"845DA0A4-1983-4E82-99C8-B7FBF47C632E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:10.4.0:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A63FBB7-F1CF-4603-848F-980742D2ED36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:asterisk:10.4.0:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"10B2084F-3AF4-4008-899C-6C1E43715201\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:certified_asterisk:1.8.11:cert:*:*:*:*:*:*\", \"matchCriteriaId\": \"C63C46CC-02E2-40AF-8281-F2FB5D89823A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:digium:certified_asterisk:1.8.11:cert1:*:*:*:*:*:*\", \"matchCriteriaId\": \"71BAF2A7-024D-475A-88C0-0F5ADE3CA286\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"chan_iax2.c in the IAX2 channel driver in Certified Asterisk 1.8.11-cert before 1.8.11-cert2 and Asterisk Open Source 1.8.x before 1.8.12.1 and 10.x before 10.4.1, when a certain mohinterpret setting is enabled, allows remote attackers to cause a denial of service (daemon crash) by placing a call on hold.\"}, {\"lang\": \"es\", \"value\": \"chan_skinny.c en el controlador de canal de Skinny (alias SCCP) en Certified Asterisk 1.8.11-cert antes de v1.8.11-cert2 y Asterisk Open Source v1.8.x antes de v1.8.12.1 y v10.x antes de v10.4.1, cuando una determinada opci\\u00f3n mohinterpret est\\u00e1 habilitada, permite a atacantes remotos causar una denegaci\\u00f3n de servicio (ca\\u00edda de demonio) mediante la colocaci\\u00f3n de una llamada en espera.\"}]",
"id": "CVE-2012-2947",
"lastModified": "2024-11-21T01:40:00.217",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:H/Au:N/C:N/I:N/A:P\", \"baseScore\": 2.6, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"HIGH\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 4.9, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2012-06-02T15:55:00.983",
"references": "[{\"url\": \"http://archives.neohapsis.com/archives/bugtraq/2012-05/0144.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://downloads.asterisk.org/pub/security/AST-2012-007.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/49303\", \"source\": \"cve@mitre.org\", \"tags\": [\"Not Applicable\"]}, {\"url\": \"http://www.debian.org/security/2012/dsa-2493\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.securitytracker.com/id?1027102\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://archives.neohapsis.com/archives/bugtraq/2012-05/0144.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://downloads.asterisk.org/pub/security/AST-2012-007.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/49303\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Not Applicable\"]}, {\"url\": \"http://www.debian.org/security/2012/dsa-2493\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.securitytracker.com/id?1027102\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-284\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2012-2947\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2012-06-02T15:55:00.983\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"chan_iax2.c in the IAX2 channel driver in Certified Asterisk 1.8.11-cert before 1.8.11-cert2 and Asterisk Open Source 1.8.x before 1.8.12.1 and 10.x before 10.4.1, when a certain mohinterpret setting is enabled, allows remote attackers to cause a denial of service (daemon crash) by placing a call on hold.\"},{\"lang\":\"es\",\"value\":\"chan_skinny.c en el controlador de canal de Skinny (alias SCCP) en Certified Asterisk 1.8.11-cert antes de v1.8.11-cert2 y Asterisk Open Source v1.8.x antes de v1.8.12.1 y v10.x antes de v10.4.1, cuando una determinada opci\u00f3n mohinterpret est\u00e1 habilitada, permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de demonio) mediante la colocaci\u00f3n de una llamada en espera.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:N/I:N/A:P\",\"baseScore\":2.6,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":4.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-284\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"036E8A89-7A16-411F-9D31-676313BB7244\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6344E43-E8AA-4340-B3A7-72F5D6A5D184\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C170C1C-909D-4439-91B5-DB1A9CD150C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE821BE5-B1D3-4854-A700-3A83E5F15724\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"149C57CA-0B4B-4220-87FC-432418D1C393\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"035595D5-BBEC-4D85-AD7A-A2C932D2BA70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DAF5655-F09F-47F8-AFA6-4B95F77A57F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8E001D8-0A7B-4FDD-88E3-E124ED32B81C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D5CFFBD-785F-4417-A54A-F3565FD6E736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D30EF999-92D1-4B19-8E32-1E4B35DE4EA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"A67D156B-9C43-444F-ADEC-B21D99D1433C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"893EB152-6444-43DB-8714-9735354C873A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8447EE7-A834-41D7-9204-07BD3752870C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C04F2C9-5672-42F2-B664-A3EE4C954C29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33465668-4C91-4619-960A-D26D77853E53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAD08674-0B44-44EA-940B-6812E2D5077D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEE87710-A129-43AA-BA08-8001848975FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F582C6E-5DA0-4D72-A40E-66BDBC5CF2B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E7CEBB8-01B3-4A05-AFE8-37A143C9833E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"522733A7-E89E-4BFD-AC93-D6882636E880\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FAC47DD-B613-43E4-B9BF-6120B81D9789\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"86D20CB5-60E8-405E-B387-CF80C7DA5E07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"71AB5A01-5961-4053-9111-CF32C6473A00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"77D8E1DC-041F-4B87-AF9A-E0EC4D6A4BD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CCCB892-30CE-4BEF-904E-5D957F94D0EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F156798F-F2EF-4366-B17E-03165AB437D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EFBB9A6-DD1D-436E-919F-74A3E4F40396\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"054E34C8-B6A5-48C7-938E-D3C268E0E8BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DCECA72-533A-4A95-AB19-20C5F09A1B01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E2309F8-AFEE-4150-99D1-BA606432ED73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"7785F282-BFA0-400A-8398-872ACCA4BF37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1278D3FB-78C6-4F7D-A845-0A93D4F6E2B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C00A6EFB-A848-46D3-AAD7-FD8140007E42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB6E3972-5C53-4B6D-BFE1-67E1122EA013\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"048617A0-A783-4519-A947-35220D4CD786\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD493A41-E686-444C-A34E-412804510F77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"87D25FD6-CC3A-4AB0-B7B1-67D07386F99D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C402E9E-09CC-4EFA-AC27-156437B05B22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8A41F9C-D2F4-47A9-80CD-2B1BF6B0CB63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"627FF5B9-E5A8-4DBC-A891-B175011E72A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6146EB2E-BA32-4408-B10B-A711EC39C580\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C863324-05AE-4FCA-BD2E-39040A468DCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A85F51E7-0AAE-4F3B-9F90-BD2E31255822\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"315FB0D4-D4A4-4369-BFB8-F2CAEB429015\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC74D6C5-F410-4B68-AF92-056B727193A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B70911F8-A526-4600-8198-03FF4CCB28DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA60A9C9-C2EF-4971-BEFB-FF687DAEF2F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.8.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAFB22FA-CC24-4AFE-AC83-2D044563F7CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.8.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"00F3EB0D-7C63-46B5-BA95-8486B9716C78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.8.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"00C1BF3B-7593-478D-9AAA-153901C70286\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.8.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"82423EC2-FA29-4AF6-86C3-6AC6DFDC4DC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.8.0:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F86406A-0936-4A06-88FB-4137A64498EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"672CE4C0-EBD6-470B-937E-810FF1C4CDBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88DB1105-74D8-4312-9D02-D1E21F2E785C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"404C0557-6229-4D90-BFDD-54AFFCCE6A19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.9.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D1D26CC-891F-4396-B7D7-30D712829E71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.9.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F25B61EA-F4D1-452A-9D96-B8DFDD719B0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.9.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9324AB96-EC99-4F04-A0A9-00F936C86EFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B8B5E76-4A74-4E88-8A6F-C23538B7642A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDB6BBCA-47CE-49B8-9706-AFDE4BE46550\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BFF65E2-692B-4C39-88FC-6DED8D9A7258\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5260E309-9320-4DB8-A918-7D215BF95D2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.10.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"60AFF340-A866-4CFE-9334-53B95FD4AA59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.10.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"74E50309-CD7D-41F7-97DA-A7E451D0796A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.10.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FD3F8F8-820E-4C29-9F8F-023D1DB999CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.10.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"C33A6419-0D00-49D6-9A48-2B633610AAED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"447E07C9-4A25-418D-B53F-609B78EE4C21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E8AE686-B618-4B0D-BD27-1F96295E964D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.11.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9751C0A-84F5-4A43-8282-12A9DE559569\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.11.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F67E2694-F6F1-482C-91F2-D9FD856EA31B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E2D53AA-8D50-445F-9500-2F580F260DC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D9D7D88-D64F-4F54-8C84-6AC45FBD36F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F67AB282-591C-4ED7-9750-C593A38D5D7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.12.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9F8F881-2BF7-44AB-8756-54A06801EB11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.12.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"36EFF3C4-4D00-4BC5-94B9-403BB00C6AB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:1.8.12.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E434F10-395E-426E-A988-4CDA504577D0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"687ED3CE-67C4-410D-8AF4-C769015598F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.0.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"30E918CD-89C4-42DA-9709-E50E0A3FA736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.0.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA57FA15-D0D7-4A97-9C25-6F6566940098\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.0.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1C45300-A2CF-40E7-AB67-23DC24C31A1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.0.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"958081DC-1D77-45CD-A940-C7A1AB42C7BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.0.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"298A879D-4F65-4523-A752-D17C4F81B822\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37AB07BE-54C4-4972-A05F-D1E2CF4363CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBC63564-A84E-463D-8312-DDF1C6B7796F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.1.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"62A0906E-B631-4F3A-9ABC-9A43A43220BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.1.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6314ADA-2849-416D-966E-C01C322EF904\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B6CB1DD-614A-4B3D-99AE-9B1341427024\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC95B04F-3746-4F1C-8428-A1FA10253E14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20819080-E0AB-4879-B4CF-A154D6F7EF6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6C45753-E2CC-4F7C-B8DA-3D8CF255EA22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.2.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A080197-D6AA-4FDC-888E-51D1C8251E34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.2.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F08D930-D4C1-4C63-875C-171C46AE97C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.2.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AA43D7D-AEAD-47CB-BFA5-B73004A1A7A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.2.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5ED5F6F-166D-4610-8939-A33AD45F1ADE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D40002A-564E-425C-BA2A-7C4A8F8DAFD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"521C4DB2-7127-4BA9-94FC-AB0E9E06FE2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.3.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C905DC1-8AB8-4D83-BB5B-FA4DABC58229\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.3.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECC74B5D-97A1-46FF-AFA3-5D5E4A0BF3A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2D98C7C-94A8-4348-AF22-04A41FB6F8EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85D39A99-E9A6-4860-BC61-56CA2FC3238B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.4.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"845DA0A4-1983-4E82-99C8-B7FBF47C632E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.4.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A63FBB7-F1CF-4603-848F-980742D2ED36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:asterisk:10.4.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"10B2084F-3AF4-4008-899C-6C1E43715201\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:certified_asterisk:1.8.11:cert:*:*:*:*:*:*\",\"matchCriteriaId\":\"C63C46CC-02E2-40AF-8281-F2FB5D89823A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:digium:certified_asterisk:1.8.11:cert1:*:*:*:*:*:*\",\"matchCriteriaId\":\"71BAF2A7-024D-475A-88C0-0F5ADE3CA286\"}]}]}],\"references\":[{\"url\":\"http://archives.neohapsis.com/archives/bugtraq/2012-05/0144.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://downloads.asterisk.org/pub/security/AST-2012-007.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/49303\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://www.debian.org/security/2012/dsa-2493\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securitytracker.com/id?1027102\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://archives.neohapsis.com/archives/bugtraq/2012-05/0144.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://downloads.asterisk.org/pub/security/AST-2012-007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/49303\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://www.debian.org/security/2012/dsa-2493\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securitytracker.com/id?1027102\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…