Vulnerability CVE-2009-0041


Published: 2009-01-14   Modified: 2012-02-13

Description:
IAX2 in Asterisk Open Source 1.2.x before 1.2.31, 1.4.x before 1.4.23-rc4, and 1.6.x before 1.6.0.3-rc2; Business Edition A.x.x, B.x.x before B.2.5.7, C.1.x.x before C.1.10.4, and C.2.x.x before C.2.1.2.1; and s800i 1.2.x before 1.3.0 responds differently to a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Information leak in IAX2 authentication
Asterisk Securit...
09.01.2009

Type:

CWE-200

(Information Exposure)

Vendor: Asterisk
Product: Asterisk business edition 
Version:
c.1.0
b.2.5.3
b.2.5.2
b.2.5.1
b.2.5.0
b.2.3.6
b.2.3.5
b.2.3.4
b.2.3.3
b.2.3.2
b.2.3.1
b.2.2.1
b.2.2.0
b.1.3.3
b.1.3.2
a
Product: Open source 
Version:
1.6.0.3
1.6.0.2
1.6.0.1
1.6.0
1.4_revision_95946
1.4beta
1.4.9
1.4.8
1.4.7.1
1.4.7
1.4.6
1.4.5
1.4.4
1.4.3
1.4.23
1.4.22.2
1.4.22.1
1.4.22
1.4.21.2
1.4.21.1
1.4.21
1.4.20
1.4.2
1.4.19.2
1.4.19.1
1.4.19
1.4.18.1
1.4.18
1.4.17
1.4.16.2
1.4.16.1
1.4.16
1.4.15
1.4.14
1.4.13
1.4.12.1
1.4.12
1.4.11
1.4.10.1
1.4.10
1.4.1
1.4.0
1.2.30.4
1.2.30.3
1.2.30.2
1.2.30
1.2.3
1.2.29
1.2.28
1.2.27
1.2.26.2
1.2.26.1
1.2.26
1.2.25
1.2.24
1.2.23
1.2.22
1.2.21.1
1.2.21
1.2.20
1.2.2
1.2.19
1.2.18
1.2.17
1.2.16
1.2.15
1.2.14
1.2.13
1.2.12.1
1.2.12
1.2.11
1.2.10
1.2.1
1.2.0beta2
1.2.0beta1
1.2.0
Product: S800i appliance 
Version: 1.2;

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None

 References:
http://downloads.digium.com/pub/security/AST-2009-001.html
http://security.gentoo.org/glsa/glsa-200905-01.xml
http://securityreason.com/securityalert/4910
http://www.debian.org/security/2009/dsa-1952
http://www.securityfocus.com/archive/1/499884/100/0/threaded
http://www.securityfocus.com/bid/33174
http://www.securitytracker.com/id?1021549
http://www.vupen.com/english/advisories/2009/0063

Related CVE
CVE-2017-9358
A memory exhaustion vulnerability exists in Asterisk Open Source 13.x before 13.15.1 and 14.x before 14.4.1 and Certified Asterisk 13.13 before 13.13-cert4, which can be triggered by sending specially crafted SCCP packets causing an infinite loop and...
CVE-2016-9937
An issue was discovered in Asterisk Open Source 13.12.x and 13.13.x before 13.13.1 and 14.x before 14.2.1. If an SDP offer or answer is received with the Opus codec and with the format parameters separated using a space the code responsible for parsi...
CVE-2016-9938
An issue was discovered in Asterisk Open Source 11.x before 11.25.1, 13.x before 13.13.1, and 14.x before 14.2.1 and Certified Asterisk 11.x before 11.6-cert16 and 13.x before 13.8-cert4. The chan_sip channel driver has a liberal definition for white...
CVE-2014-8418
The DB dialplan function in Asterisk Open Source 1.8.x before 1.8.32, 11.x before 11.1.4.1, 12.x before 12.7.1, and 13.x before 13.0.1 and Certified Asterisk 1.8 before 1.8.28-cert8 and 11.6 before 11.6-cert8 allows remote authenticated users to gain...
CVE-2014-8417
ConfBridge in Asterisk 11.x before 11.14.1, 12.x before 12.7.1, and 13.x before 13.0.1 and Certified Asterisk 11.6 before 11.6-cert8 allows remote authenticated users to (1) gain privileges via vectors related to an external protocol to the CONFBRIDG...
CVE-2014-8416
Use-after-free vulnerability in the PJSIP channel driver in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1, when using the res_pjsip_refer module, allows remote attackers to cause a denial of service (crash) via an in-dialog INVITE wi...
CVE-2014-8415
Race condition in the chan_pjsip channel driver in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1 allows remote attackers to cause a denial of service (assertion failure and crash) via a cancel request for a SIP session with a queued ...
CVE-2014-8414
ConfBridge in Asterisk 11.x before 11.14.1 and Certified Asterisk 11.6 before 11.6-cert8 does not properly handle state changes, which allows remote attackers to cause a denial of service (channel hang and memory consumption) by causing transitions t...

Copyright 2019, cxsecurity.com

 

Back to Top