Action not permitted
Modal body text goes here.
cve-2015-6360
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:22:21.120Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1035650", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035650" }, { "name": "1035649", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035649" }, { "name": "20160420 Multiple Cisco Products libSRTP Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160420-libsrtp" }, { "name": "DSA-3539", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3539" }, { "name": "1035651", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035651" }, { "name": "1035636", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035636" }, { "name": "1035648", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035648" }, { "name": "1035652", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035652" }, { "name": "1035637", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035637" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-04-20T00:00:00", "descriptions": [ { "lang": "en", "value": "The encryption-processing feature in Cisco libSRTP before 1.5.3 allows remote attackers to cause a denial of service via crafted fields in SRTP packets, aka Bug ID CSCux00686." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-03T18:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1035650", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035650" }, { "name": "1035649", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035649" }, { "name": "20160420 Multiple Cisco Products libSRTP Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160420-libsrtp" }, { "name": "DSA-3539", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3539" }, { "name": "1035651", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035651" }, { "name": "1035636", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035636" }, { "name": "1035648", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035648" }, { "name": "1035652", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035652" }, { "name": "1035637", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035637" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2015-6360", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The encryption-processing feature in Cisco libSRTP before 1.5.3 allows remote attackers to cause a denial of service via crafted fields in SRTP packets, aka Bug ID CSCux00686." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1035650", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035650" }, { "name": "1035649", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035649" }, { "name": "20160420 Multiple Cisco Products libSRTP Denial of Service Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160420-libsrtp" }, { "name": "DSA-3539", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3539" }, { "name": "1035651", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035651" }, { "name": "1035636", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035636" }, { "name": "1035648", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035648" }, { "name": "1035652", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035652" }, { "name": "1035637", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035637" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2015-6360", "datePublished": "2016-04-21T10:00:00", "dateReserved": "2015-08-17T00:00:00", "dateUpdated": "2024-08-06T07:22:21.120Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-6360\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2016-04-21T10:59:00.117\",\"lastModified\":\"2023-08-15T14:52:02.310\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The encryption-processing feature in Cisco libSRTP before 1.5.3 allows remote attackers to cause a denial of service via crafted fields in SRTP packets, aka Bug ID CSCux00686.\"},{\"lang\":\"es\",\"value\":\"La caracter\u00edstica de procesado de cifrado en Cisco libSRTP en versiones anteriores a 1.5.3 permite a atacantes remotos provocar una denegaci\u00f3n de servicio a trav\u00e9s de campos manipulados en paquetes SRTP, tambi\u00e9n conocida como Bug ID CSCux00686.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":7.8},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10s_3.10.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E659A9C2-4E00-45F3-8F70-D9E18CDEE8D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10s_3.10.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B359E9A-65D2-447D-AA44-BEA158622923\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10s_3.10.1xbs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B217F6BD-D867-459A-AC5E-760F0BD36602\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10s_3.10.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E1B040D-CE1A-41A3-B0E9-1AA0CFC29899\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10s_3.10.2ts:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF2DB331-8EF3-4AC2-874D-360F439741E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10s_3.10.4s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD279792-84E4-4E9C-9DBD-2E0689279981\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10s_3.10.5s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67CF54E1-2890-4F70-81A1-04AFB98CC2BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10s_3.10.6s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"137FCB00-9FD5-4C45-9DE4-EC4BB2679049\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10s_3.10.7s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"210240F9-5C68-4178-A785-60A606C32FC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.11s_3.11.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"186A4D4A-5977-45BC-A054-72B20FA574FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.11s_3.11.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DEF72D7-D889-4197-8469-A849050DE808\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.11s_3.11.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"737754AA-C961-433E-B9D0-7C7ED0310F0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.11s_3.11.3s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFCFC44D-F618-457B-BD53-F09224F1C599\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.11s_3.11.4s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BC5C495-4CFE-4126-A358-5E4B40D17CC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.13s_3.13.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"663B2239-BC08-4C0C-A16C-FA7CFD0B1F1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.13s_3.13.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27806BF7-0971-4F71-A0CC-A9FADEF40F22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.13s_3.13.4s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42425169-F2EE-4157-9AA6-CF1B4FD12B72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.14s_3.14.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E1BE381-4C2A-45B1-9647-FB1581BF687A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.15s_3.15.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD1C0761-BC14-4FD7-B852-88EAB4E78F83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.15s_3.15.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9C5187C-C7E0-4446-B528-C5DE1AAB90ED\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:webex_meeting_center:base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28A6CA7D-D7C8-4ECC-B5F1-200209A6892F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:dx_series_ip_phones_firmware:9.3\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDDBE37A-683F-4A7F-98DB-BBE6704F4A0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ip_phone_7800_series_firmware:10.3\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0BBC8C6-00BA-42A2-8AEB-8713F1B839C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ip_phone_8800_series_firmware:10.3\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05ED7BA0-6B55-4A04-BBAF-102B99248302\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ip_phone_8800_series_firmware:11.0\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49CF653C-B5F5-427B-9FE9-D34D7B92AA13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_ip_phone_6900_series_firmware:9.3\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E87AAF0C-E9D4-4195-8343-CEEC9C52E75C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_ip_phone_7900_series_firmware:9.9\\\\(9.99001.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB845296-F772-4A6E-98DC-68D7C2FA5686\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_ip_phone_7900_series_firmware:9.9_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4CF2229-FB0B-40BA-B821-49CB26F458D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.0\\\\(1\\\\)sr1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49B899D8-4784-483D-A833-C72371CEC12C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.0\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E7619E1-E4A2-43B3-AF98-4917587C856E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.0\\\\(4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84ED85A1-D16F-4F8D-82C6-2E414EE2F590\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.1\\\\(1\\\\)sr1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2ED0C9E-118A-4C01-8788-6E6FD65CE60B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.1\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C420DA10-774A-4D38-A087-AFA6C52BB666\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.2\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5456A29-0F99-427E-A181-C562B0BE837D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.2\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4E0532D-53EC-471F-9689-1EE0248FBD10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.2\\\\(2\\\\)sr1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AA8A4E5-7E14-4BE9-AB2C-C2F6EB4E5F0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.2\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68D74C73-E5E7-47BA-BA21-24E09E7A599F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.2\\\\(4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCA1FEE7-49E7-4065-BDA6-83F3D4CAC872\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.3\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D14B1890-F038-4B20-9BDF-03676C148E90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.3\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65D8F5AD-8676-4EFE-B4D1-93039F500C01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.3\\\\(2\\\\)sr1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68CE6B62-66F8-4DD0-B245-5E7D5323EC0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.3\\\\(4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19516CAF-9167-47D8-A926-26A95CB19669\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.4\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA675CA8-56A1-4D47-94F3-04C974FF2DA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.4\\\\(1\\\\)sr1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF575CF9-F701-439D-8B58-DFD2625B87ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.4\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ED2689D-A5CA-4B90-A336-BE3C850E4992\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_wireless_ip_phone_7920_firmware:1.0\\\\(5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60ADF922-B1CE-4FFB-ADAF-48EDADC06F32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_wireless_ip_phone_7920_firmware:1.0\\\\(6\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03132810-121C-4210-8FE8-D8C49F9B5F9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_wireless_ip_phone_7920_firmware:1.0\\\\(7\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A0526B5-646B-4115-BA28-774AB6334DA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_wireless_ip_phone_7920_firmware:1.0\\\\(8\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"180F4593-7F86-4702-B248-A3D0AB20D675\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_wireless_ip_phone_7920_firmware:1.0\\\\(9\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51CF8E3E-6D57-4DD7-91B7-7C6ADCDC1B55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_wireless_ip_phone_7920_firmware:1.0_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"638A6537-62E1-4757-B857-603FA5C80C39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_wireless_ip_phone_7920_firmware:2.0_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"551A4418-B9BD-4F22-ABF6-C981E3B4D91E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1.0.104:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"200F740F-9D7D-4A64-AE1F-276CF58241C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.0.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70158003-F6CA-4A5C-893C-BF885A388D31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F2C8AFA-A4B6-44A2-B00C-1950997493C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6297451E-196E-4C6D-9186-451BB42CAE8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"465313C5-BFB9-458A-8150-8F7BA1F8C386\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF399187-270F-4560-9C09-DF18132FA427\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE7A928A-2CBA-43BC-B312-975EE9E24830\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CF721BA-25FF-485E-9102-5741AC9BC9B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F34D78E-68C9-4372-85F2-E74A1C8C06F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05748A45-8423-42F4-8F95-7BA83548C4E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C15D1F6-997D-47FD-A654-AEF3332E6105\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA3E5F50-CBD1-4516-BC97-3AF59DB39A84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62B54134-5AC7-4D7E-A7F1-D4C2057FF146\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AFE499E-09BB-4C86-AC74-7568B2D3CA51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A0B5BF7-18FB-4066-947E-7352B9951AFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B42DD43A-B6BD-4C2B-BA57-928501C62388\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDE65B75-4987-4E77-8814-F7BC9875924A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C890603E-6634-46E2-AFA9-ADE8ED1B9E41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEBAB79E-83BF-4AD1-875B-D015A18ECB82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DA41C5E-F854-4729-9498-C54FA5C00664\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B08E743-488A-4F99-ABA6-98AD534B603B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"978A0B9D-1B1D-4E22-893C-52DE75247BA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD17927A-7AFA-4177-A34E-5FEB7A9400AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E4B884F-EDE6-4055-83D8-609D2D1E518F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8570FBED-D38F-49ED-8C6A-E241BF7E1274\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2889989-8D9C-4E06-8477-8BCF6DC7D84A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02E9724F-AD95-4572-BD8F-27B71F8EBC5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5990B883-0B5A-44F0-B4DC-8031ED0F2026\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BA74460-D26D-4C0A-B697-DF9003096065\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90BEB7A8-B2DB-46EB-9265-AB88476B1002\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DF80D39-35D2-447C-A809-E4C819FEEF25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7F417BC-5835-4F29-8DB6-03A62B7B2364\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D90599A3-F885-414E-94F9-B4AECEB34D31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0185F882-E031-4B16-8DB3-62F76FBB78C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"092FB46B-A4A4-40E5-B474-4FC36ADC427C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEB27EFB-BF82-493D-ADF2-7395B4E2A55F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AD84D98-1B98-454C-AF63-DE5E76E17C8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D975A3B-0B3C-44E6-BE9C-AA73CF97AF78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DAF32AF-EF06-4663-BFBE-1334D491A212\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9FB85D8-B247-4921-AE49-C2A1C2FDEB5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29BA59C8-F3D0-4B94-824B-F3CDAB465D30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBF3C75D-751C-444F-A4AF-303409B22B1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7CD6FE3-1B32-461E-9215-0F016798B61E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22552CF4-01F8-46A8-ADD4-7BABFA574330\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA1C5485-EAF4-4F4D-AFA1-E105F433665E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"989F9AC4-C2D1-49A0-95C3-79A4EB827E07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFE2E079-D7AC-4FE9-8938-A75C12AF5CA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B442C852-2465-4EA8-A977-1F10A4CE23AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6DB6ED4-3095-46C1-9CB6-2975A7B05303\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE68CD8E-B9CF-4519-8B0E-4C4488B34887\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D762C9A7-005C-44FD-9BB2-7A1DD4EBE90B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE0B1212-87F3-46E5-B14A-C0C6BBAAAC98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"518D4826-06B0-4DDC-B082-A536418FD292\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E343DE08-58FA-4C39-99F9-8CB5F57D0CD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76363698-DB62-4D92-8EE4-069891A9F92C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6159BEE3-D097-4E07-9962-06DB740E2AE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD606591-F69A-47AD-9256-20B98CA16135\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4EF3895-F372-45D3-9C7D-15F5C4712D08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DC5960D-B917-4ABA-850F-A710676ACB40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B746A138-6650-49A3-87C8-3728FE5CF215\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E50C2A13-5A8B-4FA5-ABB8-1157E560503B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"909F9D55-9276-4CF1-BC63-7CEEF8F25C21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F383D276-D5EC-4335-AC09-9D30F6443AF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39C2A7FF-6AC3-42B5-954A-9AA5950C523A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D7F36A8-C291-423D-AF28-56AAD8D0F712\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C2009F4-F832-49D6-8346-54A7328BD93B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9221DD4-498A-4867-B647-47E42299CE45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B839A425-E08C-41B1-9270-E177E40B1E27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F4DDF53-0995-4971-A980-30FD15A40C78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F3BD921-A58A-47EB-B90D-21C3A5D02D40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"800FE449-350D-4C4C-A8C2-D4C5A3B59F36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C49BF8F7-5ACE-4D90-8F17-1AA9D3A2FD7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CE6D050-F186-492C-9813-895433B2612A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6157AA5C-8297-4A32-B0A8-1E7E801E9CD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5A13091-02C6-4D98-90C9-ED4C43BDAFAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2C3E0E1-C3F3-4D53-8116-7D1AF3CD53CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59F3DB48-E1EE-44E9-85DE-9FD7D5C59B4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27E064BD-CBC0-4556-9BCF-87D808809237\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63D5DC14-187B-4808-8377-5FF44A11AA3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64079FC4-53D8-4DBF-A2D5-2CED256F4939\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FF969BE-46BB-4AD7-85AB-8384426E9551\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8EEA7A5-67FD-4CA4-8FF8-4B17A9C47B61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94E618B3-DD03-4ECD-AB9B-97F1EDF95E79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D0DFE19-1C68-40E6-B8CD-9CC03F8B4281\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20424324-881A-496B-BC55-62AA75994249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D67012F3-5153-400E-BD6F-EB0949875F2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E40E9AB5-26E0-4BA2-9AFA-496BAA0EAC77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6BA4B2D-187A-47EC-8BE1-7EA178549476\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CF52FB9-4EA9-41A7-AD29-E963C09FC98C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04C8C6E9-D5C3-42DC-B431-9097B2FCCB52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75B5CF41-7F01-4AE9-B54B-8DB6909504B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3BDD9D1-0DE3-4FA7-BDC1-2A724162CEEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C80EAFF-E577-414A-9DDE-D27A41CB3DC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26CC07CC-0C79-48ED-BEB6-4B576A0DBD68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83FA6817-C5B7-410F-9CF7-801CC958C12E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1576FC7F-B7DD-41DD-A95E-23B1F86E4B02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3768E4B0-E457-47AB-99B0-7C1A0E0CBE35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D142088-0265-4987-8F5C-029F3DD06A18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76EDEE39-865D-4DA3-B1C9-033F2FF1A56F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"500ED3CC-4FE8-4A24-ACFE-8D7E35E50D22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD2AE76B-D04E-4D0C-85E4-8AD07F7BDEDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6E1C03C-0737-4E2B-B3F9-10770281F4AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C7052D2-0789-4A4D-917D-FCD894B7280F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0956F0A8-7424-437C-AAD8-203183BEBFCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49FB57F9-5B37-4509-B2EB-6A16DFE11F03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"952F6504-9CD0-453E-8C25-02BB9EE818F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E842AF74-D1E3-4F71-80F9-197B38942405\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0B97FB1-CC3A-40B5-853D-476E6C5D9D6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F6293A8-C21E-46F6-ACC1-6BBAD419B41F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC1A48B1-112A-41C2-BC01-BCCF5794553D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2AE7036-C8EE-441F-94A4-DE8A9E89CA8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6448B4B4-022D-4D4A-A6DE-0090CEA12595\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42813600-3186-4D19-8AF2-F4F98D3C6740\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC0969E6-151D-4298-8EC8-68D7880E994B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A0091CE-3386-4CCC-A2A8-900842EA6F51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5A450E0-09E4-44C5-B55C-78A4BDAADA45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8285C95A-316D-4965-A34D-3BCB9AB83FA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4714F698-BBAE-47BB-99E8-F90D22415EDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB55BC7E-0B3F-4202-8768-08F27B763926\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFB01683-C482-4A5B-90FA-B5266BEA452E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA16481A-4A47-4A8E-8C78-87B3A171280A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C0258ED-6ED0-49C7-A13A-368711649FFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B7A71AA-E1A6-47B7-B2B2-A3115CAA4058\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D448BB56-5B2E-4B3E-B7E8-1F4991F23D81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0346EAC-BDD1-4DC5-B8CA-20579C44AFE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2049D602-54F1-4072-936E-0D7E337162B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0710D6C8-AD34-43E2-B72B-315FFF3DC34F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70F8F1D2-2196-44C4-B420-824F49BB4ACF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E14B8D3-6D53-4E84-9B5D-24667B192C4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A05B2DFD-A0EF-42BE-B00B-334E78CA8C10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CC96C9-492F-49CB-BEFE-356581E96B3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78F1F7D4-EC51-47D1-A71A-9EF98C51D388\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D5E93DE-06C0-401C-8062-1B2EB6EFDED6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E5EBFAB-25E2-4245-B748-92CAA943D4C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8BFB446-5747-42BB-98BC-B8DF250F1842\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EF48794-2E5D-4BE0-9BB5-49ADE34F4A82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\\\(0.0\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3A13A9C-5387-4670-8E20-FE878946D091\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\\\(0.104\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F7C7DA3-C24B-41BB-BDBE-7DC58EEAC4F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\\\(3.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFC39DA3-8171-4344-A946-7965873C56F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9C31567-8AEB-49C6-AA60-4150411D62AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA140CB2-C17C-4164-A59A-8585906057BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"468D98A7-92D5-4C01-9EDD-CB44B85EA6BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BAAC9FE-CCF0-4385-B5E9-FC424CD3EFD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C9DEB1C-F9B9-4291-92B5-8EEEADC57E51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39330218-32FA-42FF-B5CA-288B7D140304\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A92D7CED-D036-414B-B9EB-DCAF7F425A7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4AAAB02-140D-46F2-A315-5791BF5A853F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EB02DBE-6D60-4D0E-8E9D-7611C3C32748\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\\\(1.50\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E044883-9952-477A-B2AA-3E0BB90C96A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\\\(1.105\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E26A1B0-D61C-4A25-8E10-02A2E3E7A02B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\\\(2.100\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F4A28B7-87A2-464A-92A8-644E3F7D13D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\\\(2.243\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D83ED80-972A-4548-9AB0-10F9A23DF749\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26D99395-D18D-458E-9880-19B7767F69D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E4CE047-3FEF-4A72-AD06-EC77D71EBCD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED33F68A-9EB0-416A-A0A5-0DF2C349FFEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F7DD812-DC72-4816-8B0F-361C32B2CD2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC41D4CD-D5EA-4678-B3AA-962C7C937118\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"996C9552-5743-4639-A077-5B057605DF21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5779CE0-7691-47DA-902C-4D32D6650C9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C69BE69-7C19-4ED3-98D3-04B1D41E56FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFE9F46B-DD74-4295-BB6A-9239E29F4416\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:1.1\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2541F3D6-BD69-47D6-8070-DDCEDEE7F497\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:1.2_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B38FA24-E514-40CA-A28E-C72440B0637A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:2.0\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCD675A5-D5FD-464A-8DBA-69687609913D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:2.0_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5E48B3D-0CFF-49AD-AD7C-C54F8BDD8748\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:2.1_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74E91D00-4862-41B7-AC81-98BED5B41DA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:7.0_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8801B286-C800-44EF-9B0D-E6B4A42C8CAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:7.1\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83C049EE-23C2-4FBE-A94A-DB5EA2BCC113\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:7.1\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B52ADDA2-D366-474C-AE65-83998FED89F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:7.1\\\\(2a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CBE0184-2D1B-4DA2-B1B6-59B3E013557A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:7.1\\\\(2a\\\\)su1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51C6DED4-9D0D-4FE3-BC94-BE1B6CBCCB5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:7.1\\\\(2b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FBF4DF8-EA6E-4160-918C-8938188E22E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:7.1\\\\(2b\\\\)su1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0591D082-7290-476D-A0B8-DEA649AE661D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:7.1\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CB1C1C9-5F1A-40F7-BEB0-66B1793C538C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:7.1\\\\(3a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B69719BD-D624-479A-BF75-04A6D1691585\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:7.1\\\\(3a\\\\)su1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"851E3C54-848C-4D6A-AC2E-9FADC3377377\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:7.1\\\\(3a\\\\)su1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90C04291-80AC-4804-86DE-D7D5653F3824\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:7.1\\\\(3b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFC6E1B0-2BEB-45C1-90F5-F79D1FBC714A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:7.1\\\\(3b\\\\)su1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95F18323-F108-4816-8AC5-F8CBADCDB06E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:7.1\\\\(3b\\\\)su2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE18C174-CFDF-48E9-B46B-696BDCF6F02E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:7.1\\\\(5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EE964E1-0A54-49C4-A1EC-5707DBADC4B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:7.1\\\\(5\\\\)su1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0610189-1E2D-4CED-AB12-E80E7F9F1930\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:7.1\\\\(5a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E56D2B86-DAC0-4E3C-A13C-4908D4312487\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:7.1\\\\(5b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7026853F-6467-41C8-AE31-B8742D230473\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:7.1\\\\(5b\\\\)su2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DB6DB1C-9493-4FE6-BBED-11C5B0BDCAE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:7.1\\\\(5b\\\\)su3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"286C8ECF-BFEB-41BD-8286-595B27AB5CB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:7.1\\\\(5b\\\\)su4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6106891F-A7EF-4380-AF53-F644C637487E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:7.1\\\\(5b\\\\)su5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8C9FCF4-3F53-4805-B564-40AF29140804\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:7.1\\\\(5b\\\\)su6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAA60E66-4CC6-4FEE-A876-ABF53F54908C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:7.1\\\\(5b\\\\)su6a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEB3A0EE-0191-4BF5-96DB-F417F0533740\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:7.1.5es33.32900-33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77F37DEF-08E5-4F54-89B0-3E0CA4FBE4AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:7.1_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B58CC96-2E5E-42E9-9252-49271AC052D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.0_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93141BE8-20AB-42DC-9838-8FE00F215342\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.5\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"101FCDD0-DC91-4111-975E-DE618D3B4E9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.5\\\\(1\\\\)su1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D386D8CD-D6EA-4705-ABDC-EA6558F5AC30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.5\\\\(1\\\\)su2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4B1917B-197C-4E28-9356-2ACC4C4DB932\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.5\\\\(1\\\\)su3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5567A000-338E-40D7-9481-674B8FFC142D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.5\\\\(1\\\\)su4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA991A88-D49E-4957-B404-6E3C15C96994\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.5\\\\(1\\\\)su5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BECA1F06-6FFD-4A0D-B140-B25E39FB8513\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.5\\\\(1\\\\)su6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2ADCE50E-87C1-49D7-B127-92174327EAB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.5_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D11810A-80D7-41BB-B370-30218FF52F17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.6\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C547C041-6C58-44D5-93D7-C02E04E93994\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.6\\\\(1a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C40F61A6-A992-4DA4-9730-D145055596C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.6\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78970987-BD6E-48A0-AF43-540C925E1F97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.6\\\\(2a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"632B8CDD-5ACC-4FFB-950B-480CC43D192D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.6\\\\(2a\\\\)su1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7740A5EF-538E-4095-91F5-E4DC03EDB35B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.6\\\\(2a\\\\)su2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D805DD4A-269D-4399-B6BF-7F40F98C3BE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.6\\\\(2a\\\\)su3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A06A53BA-668B-41C0-B223-6637487EF113\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:8.6_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82B3ABB4-A33A-4886-9871-C24B33B3AEE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:9.0\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6793E1F6-DC57-4A13-B49D-0ED45E48426C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:9.1\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50CD06E4-0C09-4DD7-B106-56DC680CE333\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:9.1\\\\(1.10\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"612C46BC-40CC-47F6-9166-4001144FB311\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:9.1\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA2751A8-A3CF-4CC7-A7F2-003165C1AEDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:10.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A49C1C0B-4B2A-4F13-996D-E3ED1F96C2A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:10.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5CC8FF5-F0FA-41E8-AD78-D277AB9776DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:10.5\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02F5AF19-C869-4A55-B4D7-38C0FFABCC6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:10.5\\\\(2.3009\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C9B5432-11E5-4800-BB0F-48DFCAF409FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:10.5_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A358C37-6257-41E6-90ED-61CDE709F085\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:11.0\\\\(0.98000.225\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1961B4F5-C2E1-41C3-AD4A-F3ABA03EFD7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:11.0\\\\(0.98000.332\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E9973BA-EC31-459A-9E10-4C0F6D5D6C4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:11.0_0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14E894A4-3F92-4AA3-8E48-4223DBC3B2EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:11.5\\\\(0.98\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93B09544-1D66-4ECD-9346-81EA5E2373E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:11.5\\\\(0.199\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B4971DD-92BD-4F11-A290-F3F0258A4432\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unity_connection:11.5_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96143B66-C21D-43BE-BC94-C28B69FCBFAF\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:jabber_software_development_kit:8.6\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F07CC41-0B27-4B97-B0D9-73C8F6D71021\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:jabber_software_development_kit:9.0\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E093F79-9ABA-4FEF-A178-8FA6EF2F871F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:jabber_software_development_kit:9.2\\\\(0\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73EE1905-615B-4893-ABD2-C979B095A8B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:jabber_software_development_kit:9.2\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA685E8E-676D-45A2-9383-37A4506F798B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:jabber_software_development_kit:9.2\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26F4872B-01EA-4473-B490-668C9AB29789\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:jabber_software_development_kit:9.2\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D5FA4C9-EEB4-4AC7-ACA1-90A4BEC4A2C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:jabber_software_development_kit:9.2\\\\(4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"414CEEED-2EAB-4BFF-9C28-A82069497B5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:jabber_software_development_kit:9.2\\\\(5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4459D13-45E1-40F6-A5D3-4DD1632A8C45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:jabber_software_development_kit:9.2\\\\(6\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA527DCA-7F9A-4A7B-8C4F-9EED0B36E038\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:jabber_software_development_kit:9.2\\\\(7\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D749F811-40EA-420C-883D-DDD31C9F3145\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:jabber_software_development_kit:9.3\\\\(0\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"896D4FA3-FF50-4C50-B823-04436C0E9B4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:jabber_software_development_kit:9.3\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B14AF067-2224-4A72-BA36-31435CB116F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:jabber_software_development_kit:9.3\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE679CDD-D0C0-4E76-A295-C714AFF10723\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:libsrtp:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.5.2\",\"matchCriteriaId\":\"1B2CFC42-D8FA-4C51-B1F1-0A03EC23A10A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_communications_manager:9.9\\\\(9\\\\)st1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DBDE7B3-6B02-450F-BFE3-FA25ABA7CCF7\"}]}]}],\"references\":[{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160420-libsrtp\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3539\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://www.securitytracker.com/id/1035636\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://www.securitytracker.com/id/1035637\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://www.securitytracker.com/id/1035648\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://www.securitytracker.com/id/1035649\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://www.securitytracker.com/id/1035650\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://www.securitytracker.com/id/1035651\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://www.securitytracker.com/id/1035652\",\"source\":\"ykramarz@cisco.com\"}]}}" } }
ghsa-5m3h-4mfw-792p
Vulnerability from github
The encryption-processing feature in Cisco libSRTP before 1.5.3 allows remote attackers to cause a denial of service via crafted fields in SRTP packets, aka Bug ID CSCux00686.
{ "affected": [], "aliases": [ "CVE-2015-6360" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-04-21T10:59:00Z", "severity": "HIGH" }, "details": "The encryption-processing feature in Cisco libSRTP before 1.5.3 allows remote attackers to cause a denial of service via crafted fields in SRTP packets, aka Bug ID CSCux00686.", "id": "GHSA-5m3h-4mfw-792p", "modified": "2022-05-17T00:28:16Z", "published": "2022-05-17T00:28:16Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6360" }, { "type": "WEB", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160420-libsrtp" }, { "type": "WEB", "url": "http://www.debian.org/security/2016/dsa-3539" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1035636" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1035637" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1035648" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1035649" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1035650" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1035651" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1035652" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
gsd-2015-6360
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2015-6360", "description": "The encryption-processing feature in Cisco libSRTP before 1.5.3 allows remote attackers to cause a denial of service via crafted fields in SRTP packets, aka Bug ID CSCux00686.", "id": "GSD-2015-6360", "references": [ "https://www.suse.com/security/cve/CVE-2015-6360.html", "https://www.debian.org/security/2016/dsa-3539", "https://access.redhat.com/errata/RHSA-2020:3873", "https://advisories.mageia.org/CVE-2015-6360.html", "https://linux.oracle.com/cve/CVE-2015-6360.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2015-6360" ], "details": "The encryption-processing feature in Cisco libSRTP before 1.5.3 allows remote attackers to cause a denial of service via crafted fields in SRTP packets, aka Bug ID CSCux00686.", "id": "GSD-2015-6360", "modified": "2023-12-13T01:20:04.091051Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2015-6360", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The encryption-processing feature in Cisco libSRTP before 1.5.3 allows remote attackers to cause a denial of service via crafted fields in SRTP packets, aka Bug ID CSCux00686." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1035650", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035650" }, { "name": "1035649", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035649" }, { "name": "20160420 Multiple Cisco Products libSRTP Denial of Service Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160420-libsrtp" }, { "name": "DSA-3539", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3539" }, { "name": "1035651", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035651" }, { "name": "1035636", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035636" }, { "name": "1035648", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035648" }, { "name": "1035652", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035652" }, { "name": "1035637", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035637" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.2ts:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.14s_3.14.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.2s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.15s_3.15.2s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.15s_3.15.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.1xbs:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.6s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.11s_3.11.3s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.11s_3.11.2s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.13s_3.13.4s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.11s_3.11.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.11s_3.11.4s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.5s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.7s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.13s_3.13.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.13s_3.13.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.4s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.11s_3.11.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:webex_meeting_center:base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.0\\(3\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.2\\(4\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ip_phone_8800_series_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.0\\(4\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_7900_series_firmware:9.9\\(9.99001.1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ip_phone_7800_series_firmware:10.3\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_wireless_ip_phone_7920_firmware:1.0_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.4\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.3\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.0\\(1\\)sr1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_6900_series_firmware:9.3\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_wireless_ip_phone_7920_firmware:1.0\\(7\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.3\\(4\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_wireless_ip_phone_7920_firmware:2.0_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_wireless_ip_phone_7920_firmware:1.0\\(6\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.2\\(2\\)sr1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.4\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.4\\(1\\)sr1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.3\\(2\\)sr1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:dx_series_ip_phones_firmware:9.3\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.1\\(1\\)sr1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.1\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.3\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.2\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ip_phone_8800_series_firmware:10.3\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_wireless_ip_phone_7920_firmware:1.0\\(8\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_wireless_ip_phone_7920_firmware:1.0\\(9\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.2\\(3\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_wireless_ip_phone_7920_firmware:1.0\\(5\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.2\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_7900_series_firmware:9.9_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\(3.1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(2.100\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\(0.104\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\(0.0\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(1.105\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(2.243\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(1.50\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.41:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.37:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.39:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.57:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.41:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.44:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.52:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.55:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1.0.104:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.46:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.48:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.0.45:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.5.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.37:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(3b\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:9.1\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.6\\(2a\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:1.2_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:11.0\\(0.98000.332\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(5a\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:9.1\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:10.5\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(5b\\)su2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.6\\(2a\\)su2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(5b\\)su6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(5b\\)su4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(3a\\)su1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:2.1_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:10.5\\(2.3009\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:10.5_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.6\\(2a\\)su1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.6\\(1a\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:11.5\\(0.98\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.5\\(1\\)su3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.5\\(1\\)su4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.6\\(2a\\)su3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:11.0\\(0.98000.225\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(2a\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:11.5\\(0.199\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(5\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:10.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:2.0_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.5\\(1\\)su2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.0_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1.5es33.32900-33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(3b\\)su1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:2.0\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.6\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:11.0_0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(5b\\)su3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(2b\\)su1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(3a\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(5b\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:9.0\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:1.1\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.5\\(1\\)su5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(3\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(5\\)su1a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.5\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(5b\\)su5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.5\\(1\\)su6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:11.5_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(5b\\)su6a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:9.1\\(1.10\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(3a\\)su1a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.6_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.5_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(2a\\)su1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.6\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.0_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(2b\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(3b\\)su2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.5\\(1\\)su1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:jabber_software_development_kit:9.2\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:jabber_software_development_kit:8.6\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:jabber_software_development_kit:9.3\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:jabber_software_development_kit:9.2\\(3\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:jabber_software_development_kit:9.2\\(5\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:jabber_software_development_kit:9.3\\(0\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:jabber_software_development_kit:9.2\\(4\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:jabber_software_development_kit:9.2\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:jabber_software_development_kit:9.3\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:jabber_software_development_kit:9.2\\(6\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:jabber_software_development_kit:9.2\\(0\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:jabber_software_development_kit:9.0\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:jabber_software_development_kit:9.2\\(7\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:libsrtp:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.5.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:unified_communications_manager:9.9\\(9\\)st1.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2015-6360" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The encryption-processing feature in Cisco libSRTP before 1.5.3 allows remote attackers to cause a denial of service via crafted fields in SRTP packets, aka Bug ID CSCux00686." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "20160420 Multiple Cisco Products libSRTP Denial of Service Vulnerability", "refsource": "CISCO", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160420-libsrtp" }, { "name": "1035637", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1035637" }, { "name": "1035651", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1035651" }, { "name": "1035649", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1035649" }, { "name": "1035636", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1035636" }, { "name": "1035650", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1035650" }, { "name": "1035648", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1035648" }, { "name": "1035652", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1035652" }, { "name": "DSA-3539", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2016/dsa-3539" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH" }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2023-08-15T14:52Z", "publishedDate": "2016-04-21T10:59Z" } } }
var-201604-0478
Vulnerability from variot
The encryption-processing feature in Cisco libSRTP before 1.5.3 allows remote attackers to cause a denial of service via crafted fields in SRTP packets, aka Bug ID CSCux00686. Cisco libSRTP The encryption processing function of the service disruption of service operation (DoS) There are vulnerabilities that are put into a state. Cisco libsrtp is prone to a remote denial-of-service vulnerability because it fails to properly handle certain types of packets. An attacker can exploit this issue to crash the affected application, resulting in denial-of-service conditions. The issue is fixed in libsrtp 1.5.3. This issue being tracked by Cisco Bug IDs CSCux00686, CSCux00697, CSCux00707, CSCux00708, CSCux00711, CSCux00716, CSCux00729, CSCux00742, CSCux00745, CSCux00748, CSCux01782, CSCux01786, CSCux04317, CSCux35568 and CSCux37802. Cisco libsrtp is a library used by Cisco to implement the Secure Real-time Transport Protocol (SRTP). RTP is used for Voice over IP (VoIP) and audio and video streaming. SRTP adds privacy and authentication. A security vulnerability exists in the encryption-processing functionality of Cisco libsrtp prior to 1.5.3. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: libsrtp security and bug fix update Advisory ID: RHSA-2020:3873-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:3873 Issue date: 2020-09-29 CVE Names: CVE-2013-2139 CVE-2015-6360 ==================================================================== 1. Summary:
An update for libsrtp is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
- Description:
The libsrtp package provides an implementation of the Secure Real-time Transport Protocol (SRTP), the Universal Security Transform (UST), and a supporting cryptographic kernel.
Security Fix(es):
-
libsrtp: improper handling of CSRC count and extension header length in RTP header (CVE-2015-6360)
-
libsrtp: buffer overflow in application of crypto profiles (CVE-2013-2139)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
970697 - CVE-2013-2139 libsrtp: buffer overflow in application of crypto profiles 1301202 - libsrtp global-buffer-overflow 1323702 - CVE-2015-6360 libsrtp: improper handling of CSRC count and extension header length in RTP header 1323705 - CVE-2015-6360 libsrtp: improper handling of CSRC count and extension header length in RTP header [rhel-7]
- Package List:
Red Hat Enterprise Linux Client (v. 7):
Source: libsrtp-1.4.4-11.20101004cvs.el7.src.rpm
x86_64: libsrtp-1.4.4-11.20101004cvs.el7.i686.rpm libsrtp-1.4.4-11.20101004cvs.el7.x86_64.rpm libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.i686.rpm libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64: libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.i686.rpm libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.x86_64.rpm libsrtp-devel-1.4.4-11.20101004cvs.el7.i686.rpm libsrtp-devel-1.4.4-11.20101004cvs.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: libsrtp-1.4.4-11.20101004cvs.el7.src.rpm
x86_64: libsrtp-1.4.4-11.20101004cvs.el7.i686.rpm libsrtp-1.4.4-11.20101004cvs.el7.x86_64.rpm libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.i686.rpm libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64: libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.i686.rpm libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.x86_64.rpm libsrtp-devel-1.4.4-11.20101004cvs.el7.i686.rpm libsrtp-devel-1.4.4-11.20101004cvs.el7.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: libsrtp-1.4.4-11.20101004cvs.el7.src.rpm
ppc64: libsrtp-1.4.4-11.20101004cvs.el7.ppc.rpm libsrtp-1.4.4-11.20101004cvs.el7.ppc64.rpm libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.ppc.rpm libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.ppc64.rpm
ppc64le: libsrtp-1.4.4-11.20101004cvs.el7.ppc64le.rpm libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.ppc64le.rpm
s390x: libsrtp-1.4.4-11.20101004cvs.el7.s390.rpm libsrtp-1.4.4-11.20101004cvs.el7.s390x.rpm libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.s390.rpm libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.s390x.rpm
x86_64: libsrtp-1.4.4-11.20101004cvs.el7.i686.rpm libsrtp-1.4.4-11.20101004cvs.el7.x86_64.rpm libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.i686.rpm libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64: libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.ppc.rpm libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.ppc64.rpm libsrtp-devel-1.4.4-11.20101004cvs.el7.ppc.rpm libsrtp-devel-1.4.4-11.20101004cvs.el7.ppc64.rpm
ppc64le: libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.ppc64le.rpm libsrtp-devel-1.4.4-11.20101004cvs.el7.ppc64le.rpm
s390x: libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.s390.rpm libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.s390x.rpm libsrtp-devel-1.4.4-11.20101004cvs.el7.s390.rpm libsrtp-devel-1.4.4-11.20101004cvs.el7.s390x.rpm
x86_64: libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.i686.rpm libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.x86_64.rpm libsrtp-devel-1.4.4-11.20101004cvs.el7.i686.rpm libsrtp-devel-1.4.4-11.20101004cvs.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: libsrtp-1.4.4-11.20101004cvs.el7.src.rpm
x86_64: libsrtp-1.4.4-11.20101004cvs.el7.i686.rpm libsrtp-1.4.4-11.20101004cvs.el7.x86_64.rpm libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.i686.rpm libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64: libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.i686.rpm libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.x86_64.rpm libsrtp-devel-1.4.4-11.20101004cvs.el7.i686.rpm libsrtp-devel-1.4.4-11.20101004cvs.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2013-2139 https://access.redhat.com/security/cve/CVE-2015-6360 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.9_release_notes/index
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBX3OeoNzjgjWX9erEAQiDzQ/+IXUAdmMRlgeg/t8Z+ApQ4ur4BxO/WRBl 5Nd8anDnQzl3uduHgXz7AcsbON2M/jWq5xUfgdydHT8fEQ7g814QbTeNMsbEQ1zS Cuv1XztiGKy5fY5my3P80+kM+tL5uFfZ22oJqpSfS7sqGFzWEl1j+TldgURSva1G XbNudX77Gp975wMDVPJlA9S9Puf59Cz6DQaoYu5Fqzwka8z1RWOdR1IfFlAcBGrO NODvSxOZB+FDzvwikgoVTNay+e7ct+Yb1Ygg1nsGjyexinkchiuKDX2Mnv1Sc/JP vaHARZmpN6llZ8Vo++hd8WGFhsIzocqF0dposlj/PmtuoFydu7x5zpluEFc2mVaM pNCwzggc8BforUdoo6z27qqpiU0o/eTmVR97Jtbzm5BTs+28IGwg6iz374VdoAeP wy1XTj2WBw0ys+0UVkAxwiSWit6RuPRhRf85B7IPsW1BwkvPm4nAi45+50cTUQ5S PldnrWd9VILcfmj1ThdevaiFjkHrAZE4HFRxd1V3uIdIwZyvtP7w4wrt8ma51CyZ isP53JER/PhJY4du3deCo4qqca5SyecLTj/gbqXoPQFn6ppUbNacWPwadjDRA5Nu qPQVoSW8Z+L91vtqM+SGapuxNN0OuqiPFcWOlMyrM8R8MqKIhTQaTLQZE1vCJx5e AhxrRaOeyWw=X+yJ -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
Debian Security Advisory DSA-3539-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso April 02, 2016 https://www.debian.org/security/faq
Package : srtp CVE ID : CVE-2015-6360 Debian Bug : 807698
Randell Jesup and the Firefox team discovered that srtp, Cisco's reference implementation of the Secure Real-time Transport Protocol (SRTP), does not properly handle RTP header CSRC count and extension header length.
For the oldstable distribution (wheezy), this problem has been fixed in version 1.4.4+20100615~dfsg-2+deb7u2.
For the stable distribution (jessie), this problem has been fixed in version 1.4.5~20130609~dfsg-1.1+deb8u1.
We recommend that you upgrade your srtp packages
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201604-0478", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ios xe", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "3.11s_3.11.4s" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.4.7.29" }, { "model": "ios xe", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "3.13s_3.13.0s" }, { "model": "ip phone 8800 series", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "11.0\\(1\\)" }, { "model": "ios xe", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "3.13s_3.13.4s" }, { "model": "dx series ip phones", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.3\\(2\\)" }, { "model": "ios xe", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "3.15s_3.15.2s" }, { "model": "ios xe", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "3.13s_3.13.1s" }, { "model": "webex meeting center", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "base" }, { "model": "ip phone 8800 series", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "10.3\\(2\\)" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.1\\(1\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2.5.48" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.3.2.40" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.6.10" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.3.2.4" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.6\\(2\\)" }, { "model": "unified wireless ip phone 7920", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.0\\(8\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.2.8" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2.3" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4.7.26" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.6.1.14" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.1.4" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.6\\(1a\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4.4" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1\\(1\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4.4.5" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.1.21" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1\\(3b\\)su2" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "10.5\\(2.3009\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.6.1.10" }, { "model": "unified ip phone 8900 series", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.4\\(2\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2.5.55" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.3.1.6" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5\\(1\\)su1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.4.26" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1\\(2\\)" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.10s_3.10.0s" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.4.35" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4.4.9" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.3" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1\\(3a\\)su1" }, { "model": "unified ip phone 8900 series", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2\\(1\\)" }, { "model": "unified ip phone 8900 series", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0\\(4\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.1.6" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2.5.41" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3.1" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.10s_3.10.7s" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.4.20" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.1.18" }, { "model": "unified ip phone 8900 series", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3\\(1\\)" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.10s_3.10.4s" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.6.6" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.2.10" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2.2.12" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "11.5_base" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2.4" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.4.7" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.7.1.7" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4.5.6" }, { "model": "jabber software development kit", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2\\(1\\)" }, { "model": "unified ip phone 6900 series", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3\\(2\\)" }, { "model": "unified ip phone 8900 series", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.4\\(1\\)" }, { "model": "unified ip phone 8900 series", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2\\(4\\)" }, { "model": "unified ip phone 7900 series", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.9_base" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.7.1.1" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5_base" }, { "model": "unified ip phone 8900 series", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3\\(4\\)" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1\\(3b\\)su1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2.2.17" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.3.2" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5\\(1\\)su4" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.7.1.13" }, { "model": "jabber software development kit", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3\\(1\\)" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.10s_3.10.6s" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2.5.57" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.7.1.17" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1\\(5\\)su1a" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.4.17" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.5.21" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1\\(5b\\)su2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3.3.1" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "11.0\\(0.98000.225\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2.1.11" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3\\(1.105\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3.3" }, { "model": "jabber software development kit", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2\\(4\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2.3" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1\\(5a\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3\\(2.243\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4.2.8" }, { "model": "unified ip phone 8900 series", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3\\(2\\)" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.6_base" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.7.1.8" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2.2.9" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4.2.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2.5" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4.7.22" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1\\(2b\\)" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1\\(3a\\)su1a" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4.2" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1\\(5b\\)su6" }, { "model": "unified ip phone 8900 series", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0\\(3\\)" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "10.5_base" }, { "model": "unified ip phone 8900 series", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0\\(1\\)sr1" }, { "model": "unified ip phone 8900 series", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1\\(1\\)sr1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.3.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4.1.3" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.10s_3.10.1xbs" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.6.1" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "10.0.0" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0_base" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4.3.9" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1\\(5b\\)" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1\\(5b\\)su4" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2.5.52" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.3.2.39" }, { "model": "jabber software development kit", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2\\(5\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2.5.50" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2.0.45" }, { "model": "jabber software development kit", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0\\(1\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2.5.33" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4.7.15" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.3" }, { "model": "jabber software development kit", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3\\(2\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.5" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.4.37" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1\\(1.10\\)" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.6\\(2a\\)su2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2.5.26" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.1.1" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.11s_3.11.1s" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2.2.7" }, { "model": "jabber software development kit", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2\\(6\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3.3.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4.0" }, { "model": "unified wireless ip phone 7920", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.0_base" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.6" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.15s_3.15.1s" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.1.0.104" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4.7.3" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.4" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.4.33" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2\\(3.1\\)" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1\\(3a\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3\\(2.100\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.1" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1\\(1\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.4.1" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "10.5\\(2\\)" }, { "model": "libsrtp", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.5.2" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0\\(1\\)" }, { "model": "jabber software development kit", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2\\(7\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.5.12" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4.4.1" }, { "model": "unified ip phone 8900 series", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2\\(2\\)" }, { "model": "unified ip phone 8900 series", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3\\(2\\)sr1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2.2.4" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.4" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5\\(1\\)su3" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2.5.40" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.1.19" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.6.1" }, { "model": "unified ip phone 8900 series", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.4\\(1\\)sr1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.6.1.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.6.4" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3.5" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.6\\(2a\\)su1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4.1.11" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2.2.16" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4.7" }, { "model": "unified ip phone 8900 series", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2\\(3\\)" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5\\(1\\)su6" }, { "model": "unified ip phone 7900 series", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.9\\(9.99001.1\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.3.6" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2.4.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3.1.1" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5\\(1\\)su5" }, { "model": "jabber software development kit", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2\\(2\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4.6" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "11.0_0" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.3.2" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1.5es33.32900-33" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "10.0.5" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.10s_3.10.2s" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.1.17" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2.4.4" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.6\\(2a\\)" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.6\\(2a\\)su3" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.0_base" }, { "model": "jabber software development kit", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2\\(3\\)" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.11s_3.11.3s" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "11.5\\(0.199\\)" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5\\(1\\)" }, { "model": "jabber software development kit", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.6\\(1\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4.5" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.4.24" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2.2.10" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "2.1_base" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.14s_3.14.0s" }, { "model": "unified wireless ip phone 7920", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.0\\(9\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.6.8" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3.2.2" }, { "model": "jabber software development kit", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3\\(0\\)" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "11.0\\(0.98000.332\\)" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1\\(2a\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2\\(0.104\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.3.2.23" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.10s_3.10.5s" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3.3.5" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1\\(5b\\)su6a" }, { "model": "unified wireless ip phone 7920", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.0\\(6\\)" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.6\\(1\\)" }, { "model": "unified wireless ip phone 7920", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "2.0_base" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1\\(2b\\)su1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2.3.3" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2.5.46" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.4.29" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.3.2.34" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.11s_3.11.2s" }, { "model": "unified wireless ip phone 7920", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.0\\(5\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4.4.3" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3\\(1.50\\)" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "2.0\\(1\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.6.1.5" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2\\(0.0\\)" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.11s_3.11.0s" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.3.2.44" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "2.0_base" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1\\(5\\)" }, { "model": "ip phone 7800 series", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "10.3\\(1\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2.5.22" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2.2.8" }, { "model": "unified wireless ip phone 7920", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.0\\(7\\)" }, { "model": "jabber software development kit", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2\\(0\\)" }, { "model": "unified communications manager", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.9\\(9\\)st1.9" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.3.1.4" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4.7.28" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.1.7" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.3.2.33" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4.3" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.4.5" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.6.1.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.3.2.31" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1\\(2a\\)su1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.3.2.25" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.3.2.41" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.7.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.6.1.17" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.7.1.11" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.7.1.16" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.3.8" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.4.5" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1\\(5b\\)su3" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2.4" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.10s_3.10.2ts" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.7.1.3" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1\\(5b\\)su5" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.5.15" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1\\(3\\)" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.10s_3.10.1s" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4.7.23" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.1.14" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.6.1.12" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "11.5\\(0.98\\)" }, { "model": "unified ip phone 8900 series", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1\\(2\\)" }, { "model": "unified ip phone 8900 series", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2\\(2\\)sr1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5.1.24" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.7.1.4" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1\\(2\\)" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1\\(3b\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.3.1.1" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.5\\(1\\)su2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2.5.13" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.3.2.13" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.3.2.37" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.6.1.13" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.5.10" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4.3.8" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2.3.4" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2_base" }, { "model": "unity connection", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.1_base" }, { "model": "libsrtp", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "1.5.3" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" } ], "sources": [ { "db": "BID", "id": "85793" }, { "db": "JVNDB", "id": "JVNDB-2015-007102" }, { "db": "NVD", "id": "CVE-2015-6360" }, { "db": "CNNVD", "id": "CNNVD-201603-465" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.2ts:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.14s_3.14.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.2s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.15s_3.15.2s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.15s_3.15.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.1xbs:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.6s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.11s_3.11.3s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.11s_3.11.2s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.13s_3.13.4s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.11s_3.11.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.11s_3.11.4s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.5s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.7s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.13s_3.13.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.13s_3.13.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.4s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.11s_3.11.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:webex_meeting_center:base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.0\\(3\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.2\\(4\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ip_phone_8800_series_firmware:11.0\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.0\\(4\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_7900_series_firmware:9.9\\(9.99001.1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ip_phone_7800_series_firmware:10.3\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_wireless_ip_phone_7920_firmware:1.0_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.4\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.3\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.0\\(1\\)sr1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_6900_series_firmware:9.3\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_wireless_ip_phone_7920_firmware:1.0\\(7\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.3\\(4\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_wireless_ip_phone_7920_firmware:2.0_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_wireless_ip_phone_7920_firmware:1.0\\(6\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.2\\(2\\)sr1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.4\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.4\\(1\\)sr1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.3\\(2\\)sr1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:dx_series_ip_phones_firmware:9.3\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.1\\(1\\)sr1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.1\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.3\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.2\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ip_phone_8800_series_firmware:10.3\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_wireless_ip_phone_7920_firmware:1.0\\(8\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_wireless_ip_phone_7920_firmware:1.0\\(9\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.2\\(3\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_wireless_ip_phone_7920_firmware:1.0\\(5\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_8900_series_firmware:9.2\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:unified_ip_phone_7900_series_firmware:9.9_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\(3.1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(2.100\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\(0.104\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\(0.0\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(1.105\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(2.243\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(1.50\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.41:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.37:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.39:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.57:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.41:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.44:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.52:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.55:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1.0.104:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.46:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.48:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.0.45:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.5.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.37:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(3b\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:9.1\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.6\\(2a\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:1.2_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:11.0\\(0.98000.332\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(5a\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:9.1\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:10.5\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(5b\\)su2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.6\\(2a\\)su2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(5b\\)su6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(5b\\)su4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(3a\\)su1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:2.1_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:10.5\\(2.3009\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:10.5_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.6\\(2a\\)su1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.6\\(1a\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:11.5\\(0.98\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.5\\(1\\)su3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.5\\(1\\)su4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.6\\(2a\\)su3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:11.0\\(0.98000.225\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(2a\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:11.5\\(0.199\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(5\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:10.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:2.0_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.5\\(1\\)su2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.0_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1.5es33.32900-33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(3b\\)su1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:2.0\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.6\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:11.0_0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(5b\\)su3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(2b\\)su1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(3a\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(5b\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:9.0\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:1.1\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.5\\(1\\)su5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(3\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(5\\)su1a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.5\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(5b\\)su5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.5\\(1\\)su6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:11.5_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(5b\\)su6a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:9.1\\(1.10\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(3a\\)su1a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.6_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.5_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(2a\\)su1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.6\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.0_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(2b\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1\\(3b\\)su2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:8.5\\(1\\)su1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:unity_connection:7.1_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:jabber_software_development_kit:9.2\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:jabber_software_development_kit:8.6\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:jabber_software_development_kit:9.3\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:jabber_software_development_kit:9.2\\(3\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:jabber_software_development_kit:9.2\\(5\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:jabber_software_development_kit:9.3\\(0\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:jabber_software_development_kit:9.2\\(4\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:jabber_software_development_kit:9.2\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:jabber_software_development_kit:9.3\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:jabber_software_development_kit:9.2\\(6\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:jabber_software_development_kit:9.2\\(0\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:jabber_software_development_kit:9.0\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:jabber_software_development_kit:9.2\\(7\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:libsrtp:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.5.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:unified_communications_manager:9.9\\(9\\)st1.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-6360" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "159345" }, { "db": "CNNVD", "id": "CNNVD-201603-465" } ], "trust": 0.7 }, "cve": "CVE-2015-6360", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-6360", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-84321", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-6360", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2015-6360", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201603-465", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-84321", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-84321" }, { "db": "JVNDB", "id": "JVNDB-2015-007102" }, { "db": "NVD", "id": "CVE-2015-6360" }, { "db": "CNNVD", "id": "CNNVD-201603-465" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The encryption-processing feature in Cisco libSRTP before 1.5.3 allows remote attackers to cause a denial of service via crafted fields in SRTP packets, aka Bug ID CSCux00686. Cisco libSRTP The encryption processing function of the service disruption of service operation (DoS) There are vulnerabilities that are put into a state. Cisco libsrtp is prone to a remote denial-of-service vulnerability because it fails to properly handle certain types of packets. \nAn attacker can exploit this issue to crash the affected application, resulting in denial-of-service conditions. \nThe issue is fixed in libsrtp 1.5.3. \nThis issue being tracked by Cisco Bug IDs CSCux00686, CSCux00697, CSCux00707, CSCux00708, CSCux00711, CSCux00716, CSCux00729, CSCux00742, CSCux00745, CSCux00748, CSCux01782, CSCux01786, CSCux04317, CSCux35568 and CSCux37802. Cisco libsrtp is a library used by Cisco to implement the Secure Real-time Transport Protocol (SRTP). RTP is used for Voice over IP (VoIP) and audio and video streaming. SRTP adds privacy and authentication. A security vulnerability exists in the encryption-processing functionality of Cisco libsrtp prior to 1.5.3. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Moderate: libsrtp security and bug fix update\nAdvisory ID: RHSA-2020:3873-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2020:3873\nIssue date: 2020-09-29\nCVE Names: CVE-2013-2139 CVE-2015-6360\n====================================================================\n1. Summary:\n\nAn update for libsrtp is now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. Description:\n\nThe libsrtp package provides an implementation of the Secure Real-time\nTransport Protocol (SRTP), the Universal Security Transform (UST), and a\nsupporting cryptographic kernel. \n\nSecurity Fix(es):\n\n* libsrtp: improper handling of CSRC count and extension header length in\nRTP header (CVE-2015-6360)\n\n* libsrtp: buffer overflow in application of crypto profiles\n(CVE-2013-2139)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat\nEnterprise Linux 7.9 Release Notes linked from the References section. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n970697 - CVE-2013-2139 libsrtp: buffer overflow in application of crypto profiles\n1301202 - libsrtp global-buffer-overflow\n1323702 - CVE-2015-6360 libsrtp: improper handling of CSRC count and extension header length in RTP header\n1323705 - CVE-2015-6360 libsrtp: improper handling of CSRC count and extension header length in RTP header [rhel-7]\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nlibsrtp-1.4.4-11.20101004cvs.el7.src.rpm\n\nx86_64:\nlibsrtp-1.4.4-11.20101004cvs.el7.i686.rpm\nlibsrtp-1.4.4-11.20101004cvs.el7.x86_64.rpm\nlibsrtp-debuginfo-1.4.4-11.20101004cvs.el7.i686.rpm\nlibsrtp-debuginfo-1.4.4-11.20101004cvs.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\nlibsrtp-debuginfo-1.4.4-11.20101004cvs.el7.i686.rpm\nlibsrtp-debuginfo-1.4.4-11.20101004cvs.el7.x86_64.rpm\nlibsrtp-devel-1.4.4-11.20101004cvs.el7.i686.rpm\nlibsrtp-devel-1.4.4-11.20101004cvs.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nlibsrtp-1.4.4-11.20101004cvs.el7.src.rpm\n\nx86_64:\nlibsrtp-1.4.4-11.20101004cvs.el7.i686.rpm\nlibsrtp-1.4.4-11.20101004cvs.el7.x86_64.rpm\nlibsrtp-debuginfo-1.4.4-11.20101004cvs.el7.i686.rpm\nlibsrtp-debuginfo-1.4.4-11.20101004cvs.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\nlibsrtp-debuginfo-1.4.4-11.20101004cvs.el7.i686.rpm\nlibsrtp-debuginfo-1.4.4-11.20101004cvs.el7.x86_64.rpm\nlibsrtp-devel-1.4.4-11.20101004cvs.el7.i686.rpm\nlibsrtp-devel-1.4.4-11.20101004cvs.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nlibsrtp-1.4.4-11.20101004cvs.el7.src.rpm\n\nppc64:\nlibsrtp-1.4.4-11.20101004cvs.el7.ppc.rpm\nlibsrtp-1.4.4-11.20101004cvs.el7.ppc64.rpm\nlibsrtp-debuginfo-1.4.4-11.20101004cvs.el7.ppc.rpm\nlibsrtp-debuginfo-1.4.4-11.20101004cvs.el7.ppc64.rpm\n\nppc64le:\nlibsrtp-1.4.4-11.20101004cvs.el7.ppc64le.rpm\nlibsrtp-debuginfo-1.4.4-11.20101004cvs.el7.ppc64le.rpm\n\ns390x:\nlibsrtp-1.4.4-11.20101004cvs.el7.s390.rpm\nlibsrtp-1.4.4-11.20101004cvs.el7.s390x.rpm\nlibsrtp-debuginfo-1.4.4-11.20101004cvs.el7.s390.rpm\nlibsrtp-debuginfo-1.4.4-11.20101004cvs.el7.s390x.rpm\n\nx86_64:\nlibsrtp-1.4.4-11.20101004cvs.el7.i686.rpm\nlibsrtp-1.4.4-11.20101004cvs.el7.x86_64.rpm\nlibsrtp-debuginfo-1.4.4-11.20101004cvs.el7.i686.rpm\nlibsrtp-debuginfo-1.4.4-11.20101004cvs.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\nlibsrtp-debuginfo-1.4.4-11.20101004cvs.el7.ppc.rpm\nlibsrtp-debuginfo-1.4.4-11.20101004cvs.el7.ppc64.rpm\nlibsrtp-devel-1.4.4-11.20101004cvs.el7.ppc.rpm\nlibsrtp-devel-1.4.4-11.20101004cvs.el7.ppc64.rpm\n\nppc64le:\nlibsrtp-debuginfo-1.4.4-11.20101004cvs.el7.ppc64le.rpm\nlibsrtp-devel-1.4.4-11.20101004cvs.el7.ppc64le.rpm\n\ns390x:\nlibsrtp-debuginfo-1.4.4-11.20101004cvs.el7.s390.rpm\nlibsrtp-debuginfo-1.4.4-11.20101004cvs.el7.s390x.rpm\nlibsrtp-devel-1.4.4-11.20101004cvs.el7.s390.rpm\nlibsrtp-devel-1.4.4-11.20101004cvs.el7.s390x.rpm\n\nx86_64:\nlibsrtp-debuginfo-1.4.4-11.20101004cvs.el7.i686.rpm\nlibsrtp-debuginfo-1.4.4-11.20101004cvs.el7.x86_64.rpm\nlibsrtp-devel-1.4.4-11.20101004cvs.el7.i686.rpm\nlibsrtp-devel-1.4.4-11.20101004cvs.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nlibsrtp-1.4.4-11.20101004cvs.el7.src.rpm\n\nx86_64:\nlibsrtp-1.4.4-11.20101004cvs.el7.i686.rpm\nlibsrtp-1.4.4-11.20101004cvs.el7.x86_64.rpm\nlibsrtp-debuginfo-1.4.4-11.20101004cvs.el7.i686.rpm\nlibsrtp-debuginfo-1.4.4-11.20101004cvs.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nlibsrtp-debuginfo-1.4.4-11.20101004cvs.el7.i686.rpm\nlibsrtp-debuginfo-1.4.4-11.20101004cvs.el7.x86_64.rpm\nlibsrtp-devel-1.4.4-11.20101004cvs.el7.i686.rpm\nlibsrtp-devel-1.4.4-11.20101004cvs.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2013-2139\nhttps://access.redhat.com/security/cve/CVE-2015-6360\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.9_release_notes/index\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2020 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nAhxrRaOeyWw=X+yJ\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3539-1 security@debian.org\nhttps://www.debian.org/security/ Salvatore Bonaccorso\nApril 02, 2016 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : srtp\nCVE ID : CVE-2015-6360\nDebian Bug : 807698\n\nRandell Jesup and the Firefox team discovered that srtp, Cisco\u0027s\nreference implementation of the Secure Real-time Transport Protocol\n(SRTP), does not properly handle RTP header CSRC count and extension\nheader length. \n\nFor the oldstable distribution (wheezy), this problem has been fixed\nin version 1.4.4+20100615~dfsg-2+deb7u2. \n\nFor the stable distribution (jessie), this problem has been fixed in\nversion 1.4.5~20130609~dfsg-1.1+deb8u1. \n\nWe recommend that you upgrade your srtp packages", "sources": [ { "db": "NVD", "id": "CVE-2015-6360" }, { "db": "JVNDB", "id": "JVNDB-2015-007102" }, { "db": "BID", "id": "85793" }, { "db": "VULHUB", "id": "VHN-84321" }, { "db": "PACKETSTORM", "id": "159345" }, { "db": "PACKETSTORM", "id": "136530" } ], "trust": 2.16 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-84321", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-84321" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-6360", "trust": 3.0 }, { "db": "SECTRACK", "id": "1035649", "trust": 1.1 }, { "db": "SECTRACK", "id": "1035637", "trust": 1.1 }, { "db": "SECTRACK", "id": "1035651", "trust": 1.1 }, { "db": "SECTRACK", "id": "1035650", "trust": 1.1 }, { "db": "SECTRACK", "id": "1035652", "trust": 1.1 }, { "db": "SECTRACK", "id": "1035648", "trust": 1.1 }, { "db": "SECTRACK", "id": "1035636", "trust": 1.1 }, { "db": "PACKETSTORM", "id": "159345", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2015-007102", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201603-465", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.3354", "trust": 0.6 }, { "db": "BID", "id": "85793", "trust": 0.4 }, { "db": "PACKETSTORM", "id": "136530", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-84321", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-84321" }, { "db": "BID", "id": "85793" }, { "db": "JVNDB", "id": "JVNDB-2015-007102" }, { "db": "PACKETSTORM", "id": "159345" }, { "db": "PACKETSTORM", "id": "136530" }, { "db": "NVD", "id": "CVE-2015-6360" }, { "db": "CNNVD", "id": "CNNVD-201603-465" } ] }, "id": "VAR-201604-0478", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-84321" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:53:12.102000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20160420-libsrtp", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160420-libsrtp" }, { "title": "Cisco libsrtp Remediation measures for denial of service vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=129504" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-007102" }, { "db": "CNNVD", "id": "CNNVD-201603-465" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-84321" }, { "db": "JVNDB", "id": "JVNDB-2015-007102" }, { "db": "NVD", "id": "CVE-2015-6360" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.4, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160420-libsrtp" }, { "trust": 1.1, "url": "http://www.debian.org/security/2016/dsa-3539" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1035636" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1035637" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1035648" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1035649" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1035650" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1035651" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1035652" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6360" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6360" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/159345/red-hat-security-advisory-2020-3873-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3354/" }, { "trust": 0.3, "url": "https://github.com/cisco/libsrtp#readme" }, { "trust": 0.3, "url": "https://bugs.mageia.org/show_bug.cgi?id=17540" }, { "trust": 0.3, "url": "https://github.com/cisco/libsrtp/releases" }, { "trust": 0.3, "url": "https://advisories.mageia.org/mgasa-2016-0037.html" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-6360" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2139" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-6360" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2013-2139" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.9_release_notes/index" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2020:3873" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "https://www.debian.org/security/" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" } ], "sources": [ { "db": "VULHUB", "id": "VHN-84321" }, { "db": "BID", "id": "85793" }, { "db": "JVNDB", "id": "JVNDB-2015-007102" }, { "db": "PACKETSTORM", "id": "159345" }, { "db": "PACKETSTORM", "id": "136530" }, { "db": "NVD", "id": "CVE-2015-6360" }, { "db": "CNNVD", "id": "CNNVD-201603-465" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-84321" }, { "db": "BID", "id": "85793" }, { "db": "JVNDB", "id": "JVNDB-2015-007102" }, { "db": "PACKETSTORM", "id": "159345" }, { "db": "PACKETSTORM", "id": "136530" }, { "db": "NVD", "id": "CVE-2015-6360" }, { "db": "CNNVD", "id": "CNNVD-201603-465" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-04-21T00:00:00", "db": "VULHUB", "id": "VHN-84321" }, { "date": "2016-01-29T00:00:00", "db": "BID", "id": "85793" }, { "date": "2016-04-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-007102" }, { "date": "2020-09-30T15:42:49", "db": "PACKETSTORM", "id": "159345" }, { "date": "2016-04-04T16:46:53", "db": "PACKETSTORM", "id": "136530" }, { "date": "2016-04-21T10:59:00.117000", "db": "NVD", "id": "CVE-2015-6360" }, { "date": "2016-02-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201603-465" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-11-04T00:00:00", "db": "VULHUB", "id": "VHN-84321" }, { "date": "2016-07-06T14:31:00", "db": "BID", "id": "85793" }, { "date": "2016-04-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-007102" }, { "date": "2023-08-15T14:52:02.310000", "db": "NVD", "id": "CVE-2015-6360" }, { "date": "2020-10-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201603-465" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "136530" }, { "db": "CNNVD", "id": "CNNVD-201603-465" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco libSRTP Service disruption in the encryption processing function (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-007102" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201603-465" } ], "trust": 0.6 } }
rhsa-2020_3873
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for libsrtp is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The libsrtp package provides an implementation of the Secure Real-time Transport Protocol (SRTP), the Universal Security Transform (UST), and a supporting cryptographic kernel. \n\nSecurity Fix(es):\n\n* libsrtp: improper handling of CSRC count and extension header length in RTP header (CVE-2015-6360)\n\n* libsrtp: buffer overflow in application of crypto profiles (CVE-2013-2139)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:3873", "url": "https://access.redhat.com/errata/RHSA-2020:3873" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.9_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.9_release_notes/index" }, { "category": "external", "summary": "970697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=970697" }, { "category": "external", "summary": "1301202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1301202" }, { "category": "external", "summary": "1323702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1323702" }, { "category": "external", "summary": "1323705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1323705" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_3873.json" } ], "title": "Red Hat Security Advisory: libsrtp security and bug fix update", "tracking": { "current_release_date": "2024-11-05T22:44:02+00:00", "generator": { "date": "2024-11-05T22:44:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2020:3873", "initial_release_date": "2020-09-29T20:27:04+00:00", "revision_history": [ { "date": "2020-09-29T20:27:04+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-09-29T20:27:04+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T22:44:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.9", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "product": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "product_id": "libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsrtp@1.4.4-11.20101004cvs.el7?arch=i686" } } }, { "category": "product_version", "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "product": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "product_id": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsrtp-debuginfo@1.4.4-11.20101004cvs.el7?arch=i686" } } }, { "category": "product_version", "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "product": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "product_id": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsrtp-devel@1.4.4-11.20101004cvs.el7?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "product": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "product_id": "libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsrtp@1.4.4-11.20101004cvs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "product": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "product_id": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsrtp-debuginfo@1.4.4-11.20101004cvs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "product": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "product_id": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsrtp-devel@1.4.4-11.20101004cvs.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.src", "product": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.src", "product_id": "libsrtp-0:1.4.4-11.20101004cvs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsrtp@1.4.4-11.20101004cvs.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "product": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "product_id": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsrtp@1.4.4-11.20101004cvs.el7?arch=s390x" } } }, { "category": "product_version", "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "product": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "product_id": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsrtp-debuginfo@1.4.4-11.20101004cvs.el7?arch=s390x" } } }, { "category": "product_version", "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "product": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "product_id": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsrtp-devel@1.4.4-11.20101004cvs.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "product": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "product_id": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsrtp@1.4.4-11.20101004cvs.el7?arch=s390" } } }, { "category": "product_version", "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "product": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "product_id": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsrtp-debuginfo@1.4.4-11.20101004cvs.el7?arch=s390" } } }, { "category": "product_version", "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "product": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "product_id": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsrtp-devel@1.4.4-11.20101004cvs.el7?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "product": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "product_id": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsrtp@1.4.4-11.20101004cvs.el7?arch=ppc64" } } }, { "category": "product_version", "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "product": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "product_id": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsrtp-debuginfo@1.4.4-11.20101004cvs.el7?arch=ppc64" } } }, { "category": "product_version", "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "product": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "product_id": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsrtp-devel@1.4.4-11.20101004cvs.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "product": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "product_id": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsrtp@1.4.4-11.20101004cvs.el7?arch=ppc" } } }, { "category": "product_version", "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "product": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "product_id": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsrtp-debuginfo@1.4.4-11.20101004cvs.el7?arch=ppc" } } }, { "category": "product_version", "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "product": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "product_id": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsrtp-devel@1.4.4-11.20101004cvs.el7?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "product": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "product_id": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsrtp@1.4.4-11.20101004cvs.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "product": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "product_id": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsrtp-debuginfo@1.4.4-11.20101004cvs.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "product": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "product_id": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsrtp-devel@1.4.4-11.20101004cvs.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "relates_to_product_reference": "7Client-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "relates_to_product_reference": "7Client-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "relates_to_product_reference": "7Client-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "relates_to_product_reference": "7Client-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "relates_to_product_reference": "7Client-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "relates_to_product_reference": "7Client-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.src", "relates_to_product_reference": "7Client-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "relates_to_product_reference": "7Client-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "relates_to_product_reference": "7Client-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "relates_to_product_reference": "7Client-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "relates_to_product_reference": "7Client-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "relates_to_product_reference": "7Client-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "relates_to_product_reference": "7Client-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "relates_to_product_reference": "7Client-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "relates_to_product_reference": "7Client-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "relates_to_product_reference": "7Client-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "relates_to_product_reference": "7Client-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "relates_to_product_reference": "7Client-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "relates_to_product_reference": "7Client-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "relates_to_product_reference": "7Client-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "relates_to_product_reference": "7Client-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "relates_to_product_reference": "7Client-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "relates_to_product_reference": "7Client-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "relates_to_product_reference": "7Client-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "relates_to_product_reference": "7Client-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.src", "relates_to_product_reference": "7Client-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "relates_to_product_reference": "7Client-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "relates_to_product_reference": "7Client-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "relates_to_product_reference": "7Client-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "relates_to_product_reference": "7Client-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "relates_to_product_reference": "7Client-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "relates_to_product_reference": "7Client-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "relates_to_product_reference": "7ComputeNode-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "relates_to_product_reference": "7ComputeNode-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "relates_to_product_reference": "7ComputeNode-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.src", "relates_to_product_reference": "7ComputeNode-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "relates_to_product_reference": "7ComputeNode-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "relates_to_product_reference": "7ComputeNode-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "relates_to_product_reference": "7ComputeNode-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "relates_to_product_reference": "7ComputeNode-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "relates_to_product_reference": "7ComputeNode-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "relates_to_product_reference": "7ComputeNode-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "relates_to_product_reference": "7ComputeNode-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "relates_to_product_reference": "7ComputeNode-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "relates_to_product_reference": "7ComputeNode-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "relates_to_product_reference": "7Server-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "relates_to_product_reference": "7Server-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "relates_to_product_reference": "7Server-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "relates_to_product_reference": "7Server-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "relates_to_product_reference": "7Server-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "relates_to_product_reference": "7Server-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.src", "relates_to_product_reference": "7Server-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "relates_to_product_reference": "7Server-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "relates_to_product_reference": "7Server-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "relates_to_product_reference": "7Server-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "relates_to_product_reference": "7Server-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "relates_to_product_reference": "7Server-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "relates_to_product_reference": "7Server-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "relates_to_product_reference": "7Server-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "relates_to_product_reference": "7Server-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "relates_to_product_reference": "7Server-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "relates_to_product_reference": "7Server-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "relates_to_product_reference": "7Server-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "relates_to_product_reference": "7Server-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "relates_to_product_reference": "7Server-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "relates_to_product_reference": "7Server-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "relates_to_product_reference": "7Server-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "relates_to_product_reference": "7Server-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "relates_to_product_reference": "7Server-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "relates_to_product_reference": "7Server-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.src", "relates_to_product_reference": "7Server-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "relates_to_product_reference": "7Server-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "relates_to_product_reference": "7Server-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "relates_to_product_reference": "7Server-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "relates_to_product_reference": "7Server-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "relates_to_product_reference": "7Server-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "relates_to_product_reference": "7Server-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "relates_to_product_reference": "7Workstation-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "relates_to_product_reference": "7Workstation-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "relates_to_product_reference": "7Workstation-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "relates_to_product_reference": "7Workstation-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.src", "relates_to_product_reference": "7Workstation-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "relates_to_product_reference": "7Workstation-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "relates_to_product_reference": "7Workstation-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "relates_to_product_reference": "7Workstation-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "relates_to_product_reference": "7Workstation-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "relates_to_product_reference": "7Workstation-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "relates_to_product_reference": "7Workstation-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "relates_to_product_reference": "7Workstation-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "relates_to_product_reference": "7Workstation-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "relates_to_product_reference": "7Workstation-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "relates_to_product_reference": "7Workstation-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "relates_to_product_reference": "7Workstation-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.src", "relates_to_product_reference": "7Workstation-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64" }, "product_reference": "libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "relates_to_product_reference": "7Workstation-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "relates_to_product_reference": "7Workstation-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "relates_to_product_reference": "7Workstation-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64" }, "product_reference": "libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "relates_to_product_reference": "7Workstation-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "relates_to_product_reference": "7Workstation-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "relates_to_product_reference": "7Workstation-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64" }, "product_reference": "libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-2139", "discovery_date": "2013-06-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "970697" } ], "notes": [ { "category": "description", "text": "Buffer overflow in srtp.c in libsrtp in srtp 1.4.5 and earlier allows remote attackers to cause a denial of service (crash) via vectors related to a length inconsistency in the crypto_policy_set_from_profile_for_rtp and srtp_protect functions.", "title": "Vulnerability description" }, { "category": "summary", "text": "libsrtp: buffer overflow in application of crypto profiles", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2139" }, { "category": "external", "summary": "RHBZ#970697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=970697" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2139", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2139" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2139", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2139" } ], "release_date": "2013-05-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-09-29T20:27:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3873" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "libsrtp: buffer overflow in application of crypto profiles" }, { "cve": "CVE-2015-6360", "discovery_date": "2016-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1323702" } ], "notes": [ { "category": "description", "text": "The encryption-processing feature in Cisco libSRTP before 1.5.3 allows remote attackers to cause a denial of service via crafted fields in SRTP packets, aka Bug ID CSCux00686.", "title": "Vulnerability description" }, { "category": "summary", "text": "libsrtp: improper handling of CSRC count and extension header length in RTP header", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-6360" }, { "category": "external", "summary": "RHBZ#1323702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1323702" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-6360", "url": "https://www.cve.org/CVERecord?id=CVE-2015-6360" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-6360", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6360" } ], "release_date": "2016-04-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-09-29T20:27:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3873" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Client-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Client-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Client-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7ComputeNode-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7ComputeNode-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7ComputeNode-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Server-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Server-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Server-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Workstation-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.src", "7Workstation-optional-7.9:libsrtp-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-optional-7.9:libsrtp-debuginfo-0:1.4.4-11.20101004cvs.el7.x86_64", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.i686", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.ppc64le", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.s390x", "7Workstation-optional-7.9:libsrtp-devel-0:1.4.4-11.20101004cvs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libsrtp: improper handling of CSRC count and extension header length in RTP header" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.