The default configuration of the SIP channel driver in Asterisk Open Source 1.4.x through 1.4.41.2 and 1.6.2.x through 1.6.2.18.2 does not enable the alwaysauthreject option, which allows remote attackers to enumerate account names by making a series of invalid SIP requests and observing the differences in the responses for different usernames, a different vulnerability than CVE-2011-2536.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2493-1 | asterisk security update |
EUVD |
EUVD-2011-2649 | The default configuration of the SIP channel driver in Asterisk Open Source 1.4.x through 1.4.41.2 and 1.6.2.x through 1.6.2.18.2 does not enable the alwaysauthreject option, which allows remote attackers to enumerate account names by making a series of invalid SIP requests and observing the differences in the responses for different usernames, a different vulnerability than CVE-2011-2536. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T23:08:23.735Z
Reserved: 2011-07-06T00:00:00.000Z
Link: CVE-2011-2666
No data.
Status : Deferred
Published: 2011-07-06T19:55:03.637
Modified: 2025-04-11T00:51:21.963
Link: CVE-2011-2666
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD