Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2008-3903

Overview

Vulnerability Score 3.5 3.5
CVE Id CVE-2008-3903
Last Modified 23 Dec 2009 01:46:12
Published 04 Sep 2008 03:41:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact NONE NONE
Availability Impact NONE NONE
Access Vector NETWORK
Access Complexity MEDIUM
Authentication SINGLE_INSTANCE

CVE-2008-3903

Summary

Asterisk Open Source 1.2.x before 1.2.32, 1.4.x before 1.4.24.1, and 1.6.0.x before 1.6.0.8; Asterisk Business Edition A.x.x, B.x.x before B.2.5.8, C.1.x.x before C.1.10.5, and C.2.x.x before C.2.3.3; s800i 1.3.x before 1.3.0.2; and Trixbox PBX 2.6.1, when Digest authentication and authalwaysreject are enabled, generates different responses depending on whether a SIP username is valid, which allows remote attackers to enumerate valid usernames.

Vulnerable Systems

Application

  • Asterisk P B X 1.2

  • Asterisk P B X 1.2.22

  • Asterisk P B X 1.4.21.1

  • Asterisk P B X 1.6

  • Trixbox Pbx 2.6.1


References

XF - asterisk-username-info-disclosure(45059)

VUPEN - ADV-2009-0933

BID - 34353

DEBIAN - DSA-1952

GENTOO - GLSA-200905-01

SECUNIA - 37677

SECUNIA - 34982

MISC - http://misel.com/?p=52

CONFIRM - http://downloads.asterisk.org/pub/security/AST-2009-003.html


Last Updated: 27 May 2016 10:48:20