CVE-2011-2666Asterisk vulnerability

4 documents4 sources
Severity
5.0MEDIUMNVD
EPSS
0.6%
top 30.80%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 6
Latest updateMay 17

Description

The default configuration of the SIP channel driver in Asterisk Open Source 1.4.x through 1.4.41.2 and 1.6.2.x through 1.6.2.18.2 does not enable the alwaysauthreject option, which allows remote attackers to enumerate account names by making a series of invalid SIP requests and observing the differences in the responses for different usernames, a different vulnerability than CVE-2011-2536.

CVSS vector

AV:N/AC:L/C:P/I:N/A:NExploitability: 10.0 | Impact: 2.9

Affected Packages3 packages

debiandebian/asterisk< asterisk 1:1.8.3.3-1 (bullseye)
Debiandigium/asterisk< 1:1.8.3.3-1
NVDdigium/asterisk88 versions+87

🔴Vulnerability Details

2
GHSA
GHSA-6w9r-hx89-h863: The default configuration of the SIP channel driver in Asterisk Open Source 12022-05-17
OSV
CVE-2011-2666: The default configuration of the SIP channel driver in Asterisk Open Source 12011-07-06

📋Vendor Advisories

1
Debian
CVE-2011-2666: asterisk - The default configuration of the SIP channel driver in Asterisk Open Source 1.4....2011