CVE-2011-2536Sensitive Information Exposure in Asterisk

Severity
5.0MEDIUMNVD
EPSS
0.2%
top 59.49%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 6
Latest updateMay 17

Description

chan_sip.c in the SIP channel driver in Asterisk Open Source 1.4.x before 1.4.41.2, 1.6.2.x before 1.6.2.18.2, and 1.8.x before 1.8.4.4, and Asterisk Business Edition C.3.x before C.3.7.3, disregards the alwaysauthreject option and generates different responses for invalid SIP requests depending on whether the user account exists, which allows remote attackers to enumerate account names via a series of requests.

CVSS vector

AV:N/AC:L/C:P/I:N/A:NExploitability: 10.0 | Impact: 2.9

Affected Packages3 packages

debiandebian/asterisk< asterisk 1:1.8.4.4~dfsg-1 (bullseye)+1
Debiandigium/asterisk< 1:1.8.4.4~dfsg-1+1
NVDdigium/asterisk114 versions+113

Patches

🔴Vulnerability Details

4
GHSA
GHSA-6w9r-hx89-h863: The default configuration of the SIP channel driver in Asterisk Open Source 12022-05-17
GHSA
GHSA-939c-fxc3-rc2x: chan_sip2022-05-17
OSV
CVE-2011-2536: chan_sip2011-07-06
OSV
CVE-2011-2666: The default configuration of the SIP channel driver in Asterisk Open Source 12011-07-06

📋Vendor Advisories

2
Debian
CVE-2011-2536: asterisk - chan_sip.c in the SIP channel driver in Asterisk Open Source 1.4.x before 1.4.41...2011
Debian
CVE-2011-2666: asterisk - The default configuration of the SIP channel driver in Asterisk Open Source 1.4....2011