CVE-2009-0041
Severity CVSS v4.0:
Pending analysis
Type:
CWE-200
Information Leak / Disclosure
Publication date:
14/01/2009
Last modified:
09/04/2025
Description
IAX2 in Asterisk Open Source 1.2.x before 1.2.31, 1.4.x before 1.4.23-rc4, and 1.6.x before 1.6.0.3-rc2; Business Edition A.x.x, B.x.x before B.2.5.7, C.1.x.x before C.1.10.4, and C.2.x.x before C.2.1.2.1; and s800i 1.2.x before 1.3.0 responds differently to a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:* | b.2.5.2 (including) | |
| cpe:2.3:a:asterisk:asterisk_business_edition:*:beta8:*:*:*:*:*:* | c.1.0 (including) | |
| cpe:2.3:a:asterisk:asterisk_business_edition:a:*:*:*:*:*:*:* | ||
| cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://downloads.digium.com/pub/security/AST-2009-001.html
- http://secunia.com/advisories/33453
- http://secunia.com/advisories/34982
- http://secunia.com/advisories/37677
- http://security.gentoo.org/glsa/glsa-200905-01.xml
- http://securityreason.com/securityalert/4910
- http://www.debian.org/security/2009/dsa-1952
- http://www.securityfocus.com/archive/1/499884/100/0/threaded
- http://www.securityfocus.com/bid/33174
- http://www.securitytracker.com/id?1021549=
- http://www.vupen.com/english/advisories/2009/0063
- http://downloads.digium.com/pub/security/AST-2009-001.html
- http://secunia.com/advisories/33453
- http://secunia.com/advisories/34982
- http://secunia.com/advisories/37677
- http://security.gentoo.org/glsa/glsa-200905-01.xml
- http://securityreason.com/securityalert/4910
- http://www.debian.org/security/2009/dsa-1952
- http://www.securityfocus.com/archive/1/499884/100/0/threaded
- http://www.securityfocus.com/bid/33174
- http://www.securitytracker.com/id?1021549=
- http://www.vupen.com/english/advisories/2009/0063



