Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-3903

Опубликовано: 04 сент. 2008
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 3.5

Описание

Asterisk Open Source 1.2.x before 1.2.32, 1.4.x before 1.4.24.1, and 1.6.0.x before 1.6.0.8; Asterisk Business Edition A.x.x, B.x.x before B.2.5.8, C.1.x.x before C.1.10.5, and C.2.x.x before C.2.3.3; s800i 1.3.x before 1.3.0.2; and Trixbox PBX 2.6.1, when Digest authentication and authalwaysreject are enabled, generates different responses depending on whether a SIP username is valid, which allows remote attackers to enumerate valid usernames.

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

1:1.6.2.0~rc2-0ubuntu1
feisty

ignored

end of life, was needed
gutsy

ignored

end of life, was needed
hardy

released

1:1.4.17~dfsg-2ubuntu1.1
intrepid

ignored

end of life, was needed
jaunty

ignored

end of life
karmic

not-affected

1:1.6.2.0~rc2-0ubuntu1
lucid

not-affected

1:1.6.2.0~rc2-0ubuntu1
maverick

not-affected

1:1.6.2.0~rc2-0ubuntu1

Показывать по

EPSS

Процентиль: 74%
0.00839
Низкий

3.5 Low

CVSS2

Связанные уязвимости

nvd
больше 17 лет назад

Asterisk Open Source 1.2.x before 1.2.32, 1.4.x before 1.4.24.1, and 1.6.0.x before 1.6.0.8; Asterisk Business Edition A.x.x, B.x.x before B.2.5.8, C.1.x.x before C.1.10.5, and C.2.x.x before C.2.3.3; s800i 1.3.x before 1.3.0.2; and Trixbox PBX 2.6.1, when Digest authentication and authalwaysreject are enabled, generates different responses depending on whether a SIP username is valid, which allows remote attackers to enumerate valid usernames.

debian
больше 17 лет назад

Asterisk Open Source 1.2.x before 1.2.32, 1.4.x before 1.4.24.1, and 1 ...

github
почти 4 года назад

Asterisk Open Source 1.2.x before 1.2.32, 1.4.x before 1.4.24.1, and 1.6.0.x before 1.6.0.8; Asterisk Business Edition A.x.x, B.x.x before B.2.5.8, C.1.x.x before C.1.10.5, and C.2.x.x before C.2.3.3; s800i 1.3.x before 1.3.0.2; and Trixbox PBX 2.6.1, when Digest authentication and authalwaysreject are enabled, generates different responses depending on whether a SIP username is valid, which allows remote attackers to enumerate valid usernames.

EPSS

Процентиль: 74%
0.00839
Низкий

3.5 Low

CVSS2