CVE-2009-0041Sensitive Information Exposure in Asterisk

Severity
5.0MEDIUMNVD
EPSS
0.9%
top 24.95%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 14
Latest updateMay 2

Description

IAX2 in Asterisk Open Source 1.2.x before 1.2.31, 1.4.x before 1.4.23-rc4, and 1.6.x before 1.6.0.3-rc2; Business Edition A.x.x, B.x.x before B.2.5.7, C.1.x.x before C.1.10.4, and C.2.x.x before C.2.1.2.1; and s800i 1.2.x before 1.3.0 responds differently to a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.

CVSS vector

AV:N/AC:L/C:P/I:N/A:NExploitability: 10.0 | Impact: 2.9

Affected Packages5 packages

Debianasterisk/asterisk_business_edition< 1:1.6.1.0~dfsg~rc3-1
NVDasterisk/open_source1.2.30.4+77
debiandebian/asterisk< asterisk 1:1.6.1.0~dfsg~rc3-1 (bullseye)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-94hf-42cp-33m4: IAX2 in Asterisk Open Source 12022-05-02
OSV
CVE-2009-0041: IAX2 in Asterisk Open Source 12009-01-14

📋Vendor Advisories

2
Red Hat
asterisk: Replies to failed login attempts differently based on whether the user account exists (information disclosure)2009-01-08
Debian
CVE-2009-0041: asterisk - IAX2 in Asterisk Open Source 1.2.x before 1.2.31, 1.4.x before 1.4.23-rc4, and 1...2009

💬Community

1
Bugzilla
CVE-2009-0041 asterisk: Replies to failed login attempts differently based on whether the user account exists (information disclosure)2009-01-15
CVE-2009-0041 — Sensitive Information Exposure | cvebase