[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2009-3727Date: (C)2009-11-10   (M)2024-02-22


Asterisk Open Source 1.2.x before 1.2.35, 1.4.x before 1.4.26.3, 1.6.0.x before 1.6.0.17, and 1.6.1.x before 1.6.1.9; Business Edition A.x.x, B.x.x before B.2.5.12, C.2.x.x before C.2.4.5, and C.3.x.x before C.3.2.2; AsteriskNOW 1.5; and s800i 1.3.x before 1.3.0.5 generate different error messages depending on whether a SIP username is valid, which allows remote attackers to enumerate valid usernames via multiple crafted REGISTER messages with inconsistent usernames in the URI in the To header and the Digest in the Authorization header.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: NONE
Availability: NONE
  
Reference:
SECTRACK-1023133
BID-36924
SECUNIA-37265
SECUNIA-37479
SECUNIA-37677
OSVDB-59697
DSA-1952
FEDORA-2009-11070
FEDORA-2009-11126
http://downloads.asterisk.org/pub/security/AST-2009-008.html
https://bugzilla.redhat.com/show_bug.cgi?id=523277
https://bugzilla.redhat.com/show_bug.cgi?id=533137

CPE    210
cpe:/a:digium:asterisk:1.6.0:rc4
cpe:/a:digium:asterisk:1.2.31.1
cpe:/a:digium:asterisk:1.6.0:rc5
cpe:/a:digium:asterisk:1.6.0:rc6
...
CWE    1
CWE-200
OVAL    2
oval:org.secpod.oval:def:600392
oval:org.mitre.oval:def:6950

© SecPod Technologies