Added |
CPE Configuration |
|
OR
*cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:* versions up to (excluding) 18.20.1
*cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:* versions from (including) 19.0.0 up to (excluding) 20.5.1
*cpe:2.3:a:digium:asterisk:21.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:sangoma:certified_asterisk:13.13.0:*:*:*:*:*:*:*
*cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert1:*:*:*:*:*:*
*cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert1-rc1:*:*:*:*:*:*
*cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert1-rc2:*:*:*:*:*:*
*cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert1-rc3:*:*:*:*:*:*
*cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert1-rc4:*:*:*:*:*:*
*cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert2:*:*:*:*:*:*
*cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert3:*:*:*:*:*:*
*cpe:2.3:a:sangoma:certified_asterisk:13.13.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:sangoma:certified_asterisk:13.13.0:rc2:*:*:*:*:*:*
*cpe:2.3:a:sangoma:certified_asterisk:16.8.0:-:*:*:*:*:*:*
*cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert1:*:*:*:*:*:*
*cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert10:*:*:*:*:*:*
*cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert11:*:*:*:*:*:*
*cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert12:*:*:*:*:*:*
*cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert2:*:*:*:*:*:*
*cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert3:*:*:*:*:*:*
*cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert4:*:*:*:*:*:*
*cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert5:*:*:*:*:*:*
*cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert6:*:*:*:*:*:*
*cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert7:*:*:*:*:*:*
*cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert8:*:*:*:*:*:*
*cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert9:*:*:*:*:*:*
*cpe:2.3:a:sangoma:certified_asterisk:18.9:cert1:*:*:*:*:*:*
*cpe:2.3:a:sangoma:certified_asterisk:18.9:cert2:*:*:*:*:*:*
*cpe:2.3:a:sangoma:certified_asterisk:18.9:cert3:*:*:*:*:*:*
*cpe:2.3:a:sangoma:certified_asterisk:18.9:cert4:*:*:*:*:*:*
*cpe:2.3:a:sangoma:certified_asterisk:18.9:cert5:*:*:*:*:*:*
|
Added |
CVSS V3.1 |
|
NIST AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
|
Added |
CWE |
|
NIST CWE-362
|
Changed |
Reference Type |
http://packetstormsecurity.com/files/176251/Asterisk-20.1.0-Denial-Of-Service.html No Types Assigned
|
http://packetstormsecurity.com/files/176251/Asterisk-20.1.0-Denial-Of-Service.html Exploit, Third Party Advisory, VDB Entry
|
Changed |
Reference Type |
http://seclists.org/fulldisclosure/2023/Dec/24 No Types Assigned
|
http://seclists.org/fulldisclosure/2023/Dec/24 Exploit, Mailing List, Third Party Advisory
|
Changed |
Reference Type |
http://www.openwall.com/lists/oss-security/2023/12/15/7 No Types Assigned
|
http://www.openwall.com/lists/oss-security/2023/12/15/7 Exploit, Mailing List
|
Changed |
Reference Type |
https://github.com/EnableSecurity/advisories/tree/master/ES2023-01-asterisk-dtls-hello-race No Types Assigned
|
https://github.com/EnableSecurity/advisories/tree/master/ES2023-01-asterisk-dtls-hello-race Exploit
|
Changed |
Reference Type |
https://github.com/asterisk/asterisk/commit/d7d7764cb07c8a1872804321302ef93bf62cba05 No Types Assigned
|
https://github.com/asterisk/asterisk/commit/d7d7764cb07c8a1872804321302ef93bf62cba05 Patch
|
Changed |
Reference Type |
https://github.com/asterisk/asterisk/security/advisories/GHSA-hxj9-xwr8-w8pq No Types Assigned
|
https://github.com/asterisk/asterisk/security/advisories/GHSA-hxj9-xwr8-w8pq Exploit, Vendor Advisory
|