U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2007-4103

Change History

Modified Analysis by NIST 2/08/2024 3:12:32 PM

Action Type Old Value New Value
Changed CPE Configuration
OR
     *cpe:2.3:a:digium:asterisk:1.2.20:*:*:*:*:*:*:*
     *cpe:2.3:a:digium:asterisk:1.2.21:*:*:*:*:*:*:*
     *cpe:2.3:a:digium:asterisk:1.2.21.1:*:*:*:*:*:*:*
     *cpe:2.3:a:digium:asterisk:1.2.22:*:*:*:*:*:*:*
     *cpe:2.3:a:digium:asterisk:1.4.5:*:*:*:*:*:*:*
     *cpe:2.3:a:digium:asterisk:1.4.7:*:*:*:*:*:*:*
     *cpe:2.3:a:digium:asterisk:1.4.7.1:*:*:*:*:*:*:*
     *cpe:2.3:a:digium:asterisk:1.4.8:*:*:*:*:*:*:*
     *cpe:2.3:a:digium:asterisk_appliance_developer_kit:0.5.0:*:*:*:*:*:*:*
     *cpe:2.3:a:digium:asterisknow_pre-release:beta6:*:*:*:*:*:*:*
OR
     *cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:* versions from (including) 1.2.20 up to (excluding) 1.2.23
     *cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:* versions from (including) 1.4.0 up to (excluding) 1.4.9
     *cpe:2.3:a:digium:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:* versions up to (excluding) 0.6.0
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Added CWE

								
							
							
						
NIST CWE-772
Removed CWE
NIST NVD-CWE-Other

								
						
Changed Reference Type
http://bugs.gentoo.org/show_bug.cgi?id=185713 No Types Assigned
http://bugs.gentoo.org/show_bug.cgi?id=185713 Issue Tracking, Patch
Changed Reference Type
http://ftp.digium.com/pub/asa/ASA-2007-018.pdf Patch
http://ftp.digium.com/pub/asa/ASA-2007-018.pdf Broken Link, Patch
Changed Reference Type
http://osvdb.org/38197 No Types Assigned
http://osvdb.org/38197 Broken Link
Changed Reference Type
http://secunia.com/advisories/26274 Patch, Vendor Advisory
http://secunia.com/advisories/26274 Broken Link, Patch, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/29051 No Types Assigned
http://secunia.com/advisories/29051 Broken Link
Changed Reference Type
http://security.gentoo.org/glsa/glsa-200802-11.xml No Types Assigned
http://security.gentoo.org/glsa/glsa-200802-11.xml Third Party Advisory
Changed Reference Type
http://securityreason.com/securityalert/2960 No Types Assigned
http://securityreason.com/securityalert/2960 Broken Link
Changed Reference Type
http://www.securityfocus.com/archive/1/475069/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/475069/100/0/threaded Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securityfocus.com/bid/24950 No Types Assigned
http://www.securityfocus.com/bid/24950 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id?1018472 No Types Assigned
http://www.securitytracker.com/id?1018472 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.vupen.com/english/advisories/2007/2701 No Types Assigned
http://www.vupen.com/english/advisories/2007/2701 Broken Link