Vulnerability Description
The SIP implementation on the Gizmo5 software phone provides hashed credentials in a response to an invalid authentication challenge, which makes it easier for remote attackers to obtain access via a brute-force attack, related to a "SIP Digest Leak" issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gizmo5 | - |
Related Weaknesses (CWE)
References
- http://voipsa.org/pipermail/voipsec_voipsa.org/2009-April/002946.htmlExploitThird Party Advisory
- https://resources.enablesecurity.com/resources/sipdigestleak-tut.pdfExploitThird Party Advisory
- http://voipsa.org/pipermail/voipsec_voipsa.org/2009-April/002946.htmlExploitThird Party Advisory
- https://resources.enablesecurity.com/resources/sipdigestleak-tut.pdfExploitThird Party Advisory
FAQ
What is CVE-2009-5139?
CVE-2009-5139 is a vulnerability with a CVSS score of 7.5 (HIGH). The SIP implementation on the Gizmo5 software phone provides hashed credentials in a response to an invalid authentication challenge, which makes it easier for remote attackers to obtain access via a ...
How severe is CVE-2009-5139?
CVE-2009-5139 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-5139?
Check the references section above for vendor advisories and patch information. Affected products include: Google Gizmo5.