Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2011-4597

Опубликовано: 15 дек. 2011
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5

Описание

The SIP over UDP implementation in Asterisk Open Source 1.4.x before 1.4.43, 1.6.x before 1.6.2.21, and 1.8.x before 1.8.7.2 uses different port numbers for responses to invalid requests depending on whether a SIP username exists, which allows remote attackers to enumerate usernames via a series of requests.

РелизСтатусПримечание
devel

not-affected

hardy

ignored

end of life
lucid

ignored

end of life
maverick

ignored

end of life
natty

ignored

end of life
oneiric

ignored

end of life
precise

not-affected

1:1.8.10.1~dfsg-1ubuntu1
quantal

not-affected

raring

not-affected

saucy

not-affected

Показывать по

EPSS

Процентиль: 71%
0.00685
Низкий

5 Medium

CVSS2

Связанные уязвимости

nvd
около 14 лет назад

The SIP over UDP implementation in Asterisk Open Source 1.4.x before 1.4.43, 1.6.x before 1.6.2.21, and 1.8.x before 1.8.7.2 uses different port numbers for responses to invalid requests depending on whether a SIP username exists, which allows remote attackers to enumerate usernames via a series of requests.

debian
около 14 лет назад

The SIP over UDP implementation in Asterisk Open Source 1.4.x before 1 ...

github
больше 3 лет назад

The SIP over UDP implementation in Asterisk Open Source 1.4.x before 1.4.43, 1.6.x before 1.6.2.21, and 1.8.x before 1.8.7.2 uses different port numbers for responses to invalid requests depending on whether a SIP username exists, which allows remote attackers to enumerate usernames via a series of requests.

EPSS

Процентиль: 71%
0.00685
Низкий

5 Medium

CVSS2