Vulnerability Description
chan_sip.c in the SIP channel driver in Asterisk Open Source 1.4.x before 1.4.41.2, 1.6.2.x before 1.6.2.18.2, and 1.8.x before 1.8.4.4, and Asterisk Business Edition C.3.x before C.3.7.3, disregards the alwaysauthreject option and generates different responses for invalid SIP requests depending on whether the user account exists, which allows remote attackers to enumerate account names via a series of requests.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Digium | Asterisk | 1.8.0 |
Related Weaknesses (CWE)
References
- http://downloads.asterisk.org/pub/security/AST-2011-011-1.8.diffPatch
- http://downloads.asterisk.org/pub/security/AST-2011-011.htmlVendor Advisory
- http://www.securitytracker.com/id?1025734
- http://downloads.asterisk.org/pub/security/AST-2011-011-1.8.diffPatch
- http://downloads.asterisk.org/pub/security/AST-2011-011.htmlVendor Advisory
- http://www.securitytracker.com/id?1025734
FAQ
What is CVE-2011-2536?
CVE-2011-2536 is a vulnerability with a CVSS score of 5.0 (MEDIUM). chan_sip.c in the SIP channel driver in Asterisk Open Source 1.4.x before 1.4.41.2, 1.6.2.x before 1.6.2.18.2, and 1.8.x before 1.8.4.4, and Asterisk Business Edition C.3.x before C.3.7.3, disregards ...
How severe is CVE-2011-2536?
CVE-2011-2536 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-2536?
Check the references section above for vendor advisories and patch information. Affected products include: Digium Asterisk.