Asterisk Open Source 1.2.x before 1.2.32, 1.4.x before 1.4.24.1, and 1.6.0.x before 1.6.0.8; Asterisk Business Edition A.x.x, B.x.x before B.2.5.8, C.1.x.x before C.1.10.5, and C.2.x.x before C.2.3.3; s800i 1.3.x before 1.3.0.2; and Trixbox PBX 2.6.1, when Digest authentication and authalwaysreject are enabled, generates different responses depending on whether a SIP username is valid, which allows remote attackers to enumerate valid usernames.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://security.gentoo.org/glsa/glsa-200905-01.xml | vendor advisory |
http://downloads.asterisk.org/pub/security/AST-2009-003.html | |
http://www.securityfocus.com/bid/34353 | vdb entry |
http://secunia.com/advisories/37677 | third party advisory |
http://www.debian.org/security/2009/dsa-1952 | vendor advisory |
http://misel.com/?p=52 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45059 | vdb entry |
http://www.vupen.com/english/advisories/2009/0933 | vdb entry |
http://secunia.com/advisories/34982 | third party advisory |