The SIP over UDP implementation in Asterisk Open Source 1.4.x before 1.4.43, 1.6.x before 1.6.2.21, and 1.8.x before 1.8.7.2 uses different port numbers for responses to invalid requests depending on whether a SIP username exists, which allows remote attackers to enumerate usernames via a series of requests.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://osvdb.org/77597 | vdb entry |
http://downloads.asterisk.org/pub/security/AST-2011-013.html | |
http://openwall.com/lists/oss-security/2011/12/09/4 | mailing list |
http://openwall.com/lists/oss-security/2011/12/09/3 | mailing list |
http://secunia.com/advisories/47273 | third party advisory |
http://archives.neohapsis.com/archives/bugtraq/2011-12/0151.html | mailing list |
http://www.debian.org/security/2011/dsa-2367 | vendor advisory |
http://lists.digium.com/pipermail/asterisk-dev/2011-November/052191.html | mailing list |