CVE-2009-0041
14.01.2009, 23:30
IAX2 in Asterisk Open Source 1.2.x before 1.2.31, 1.4.x before 1.4.23-rc4, and 1.6.x before 1.6.0.3-rc2; Business Edition A.x.x, B.x.x before B.2.5.7, C.1.x.x before C.1.10.4, and C.2.x.x before C.2.1.2.1; and s800i 1.2.x before 1.3.0 responds differently to a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.Enginsight
Vendor | Product | Version |
---|---|---|
asterisk | open_source | 𝑥 ≤ 1.2.30.4 |
asterisk | open_source | 𝑥 ≤ 1.4.23 |
asterisk | open_source | 𝑥 ≤ 1.6.0.3 |
asterisk | open_source | 1.2.0 |
asterisk | open_source | 1.2.0:beta1 |
asterisk | open_source | 1.2.0:beta2 |
asterisk | open_source | 1.2.0:rc1 |
asterisk | open_source | 1.2.0:rc2 |
asterisk | open_source | 1.2.0beta1:beta1 |
asterisk | open_source | 1.2.0beta2:beta2 |
asterisk | open_source | 1.2.1 |
asterisk | open_source | 1.2.2 |
asterisk | open_source | 1.2.2:netsec |
asterisk | open_source | 1.2.3 |
asterisk | open_source | 1.2.3:netsec |
asterisk | open_source | 1.2.10 |
asterisk | open_source | 1.2.10:netsec |
asterisk | open_source | 1.2.11 |
asterisk | open_source | 1.2.11:netsec |
asterisk | open_source | 1.2.12 |
asterisk | open_source | 1.2.12:netsec |
asterisk | open_source | 1.2.12.1 |
asterisk | open_source | 1.2.12.1:netsec |
asterisk | open_source | 1.2.13 |
asterisk | open_source | 1.2.13:netsec |
asterisk | open_source | 1.2.14 |
asterisk | open_source | 1.2.14:netsec |
asterisk | open_source | 1.2.15 |
asterisk | open_source | 1.2.15:netsec |
asterisk | open_source | 1.2.16 |
asterisk | open_source | 1.2.16:netsec |
asterisk | open_source | 1.2.17 |
asterisk | open_source | 1.2.17:netsec |
asterisk | open_source | 1.2.18 |
asterisk | open_source | 1.2.18:netsec |
asterisk | open_source | 1.2.19 |
asterisk | open_source | 1.2.19:netsec |
asterisk | open_source | 1.2.20 |
asterisk | open_source | 1.2.20:netsec |
asterisk | open_source | 1.2.21 |
asterisk | open_source | 1.2.21:netsec |
asterisk | open_source | 1.2.21.1 |
asterisk | open_source | 1.2.21.1:netsec |
asterisk | open_source | 1.2.22 |
asterisk | open_source | 1.2.22:netsec |
asterisk | open_source | 1.2.23 |
asterisk | open_source | 1.2.23:netsec |
asterisk | open_source | 1.2.24 |
asterisk | open_source | 1.2.24:netsec |
asterisk | open_source | 1.2.25 |
asterisk | open_source | 1.2.25:netsec |
asterisk | open_source | 1.2.26 |
asterisk | open_source | 1.2.26:netsec |
asterisk | open_source | 1.2.26.1 |
asterisk | open_source | 1.2.26.1:netsec |
asterisk | open_source | 1.2.26.2 |
asterisk | open_source | 1.2.26.2:netsec |
asterisk | open_source | 1.2.27 |
asterisk | open_source | 1.2.28 |
asterisk | open_source | 1.2.29 |
asterisk | open_source | 1.2.30 |
asterisk | open_source | 1.2.30.2 |
asterisk | open_source | 1.2.30.3 |
asterisk | open_source | 1.4.0 |
asterisk | open_source | 1.4.0:beta2 |
asterisk | open_source | 1.4.0:beta3 |
asterisk | open_source | 1.4.0:beta4 |
asterisk | open_source | 1.4.1 |
asterisk | open_source | 1.4.2 |
asterisk | open_source | 1.4.3 |
asterisk | open_source | 1.4.4 |
asterisk | open_source | 1.4.5 |
asterisk | open_source | 1.4.6 |
asterisk | open_source | 1.4.7 |
asterisk | open_source | 1.4.7.1 |
asterisk | open_source | 1.4.8 |
asterisk | open_source | 1.4.9 |
asterisk | open_source | 1.4.10 |
asterisk | open_source | 1.4.10.1 |
asterisk | open_source | 1.4.11 |
asterisk | open_source | 1.4.12 |
asterisk | open_source | 1.4.12.1 |
asterisk | open_source | 1.4.13 |
asterisk | open_source | 1.4.14 |
asterisk | open_source | 1.4.15 |
asterisk | open_source | 1.4.16 |
asterisk | open_source | 1.4.16.1 |
asterisk | open_source | 1.4.16.2 |
asterisk | open_source | 1.4.17 |
asterisk | open_source | 1.4.18 |
asterisk | open_source | 1.4.18.1 |
asterisk | open_source | 1.4.19 |
asterisk | open_source | 1.4.19:rc1 |
asterisk | open_source | 1.4.19:rc2 |
asterisk | open_source | 1.4.19:rc3 |
asterisk | open_source | 1.4.19:rc4 |
asterisk | open_source | 1.4.19.1 |
asterisk | open_source | 1.4.19.2 |
asterisk | open_source | 1.4.20 |
asterisk | open_source | 1.4.20:rc1 |
asterisk | open_source | 1.4.20:rc2 |
asterisk | open_source | 1.4.20:rc3 |
asterisk | open_source | 1.4.21 |
asterisk | open_source | 1.4.21:rc1 |
asterisk | open_source | 1.4.21:rc2 |
asterisk | open_source | 1.4.21.1 |
asterisk | open_source | 1.4.21.2 |
asterisk | open_source | 1.4.22 |
asterisk | open_source | 1.4.22:rc3 |
asterisk | open_source | 1.4.22:rc4 |
asterisk | open_source | 1.4.22.1 |
asterisk | open_source | 1.4.22.2 |
asterisk | open_source | 1.4.23 |
asterisk | open_source | 1.4.23:rc1 |
asterisk | open_source | 1.4.23:rc2 |
asterisk | open_source | 1.4_revision_95946:_revision_95946 |
asterisk | open_source | 1.4beta:beta |
asterisk | open_source | 1.6.0:beta1 |
asterisk | open_source | 1.6.0:beta2 |
asterisk | open_source | 1.6.0:beta3 |
asterisk | open_source | 1.6.0:beta4 |
asterisk | open_source | 1.6.0:beta5 |
asterisk | open_source | 1.6.0:beta7 |
asterisk | open_source | 1.6.0:beta7.1 |
asterisk | open_source | 1.6.0:beta8 |
asterisk | open_source | 1.6.0:beta9 |
asterisk | open_source | 1.6.0:rc4 |
asterisk | open_source | 1.6.0:rc5 |
asterisk | open_source | 1.6.0:rc6 |
asterisk | open_source | 1.6.0.1 |
asterisk | open_source | 1.6.0.2 |
asterisk | open_source | 1.6.0.3 |
asterisk | s800i_appliance | 1.2 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References