Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2008-3903

Published: 4 September 2008

Asterisk Open Source 1.2.x before 1.2.32, 1.4.x before 1.4.24.1, and 1.6.0.x before 1.6.0.8; Asterisk Business Edition A.x.x, B.x.x before B.2.5.8, C.1.x.x before C.1.10.5, and C.2.x.x before C.2.3.3; s800i 1.3.x before 1.3.0.2; and Trixbox PBX 2.6.1, when Digest authentication and authalwaysreject are enabled, generates different responses depending on whether a SIP username is valid, which allows remote attackers to enumerate valid usernames.

Priority

Low

Status

Package Release Status
asterisk
Launchpad, Ubuntu, Debian
dapper Ignored
(end of life)
feisty Ignored
(end of life, was needed)
gutsy Ignored
(end of life, was needed)
hardy
Released (1:1.4.17~dfsg-2ubuntu1.1)
intrepid Ignored
(end of life, was needed)
jaunty Ignored
(end of life)
karmic Not vulnerable
(1:1.6.2.0~rc2-0ubuntu1)
lucid Not vulnerable
(1:1.6.2.0~rc2-0ubuntu1)
maverick Not vulnerable
(1:1.6.2.0~rc2-0ubuntu1)
upstream Needs triage

Patches:
upstream: http://downloads.asterisk.org/pub/security/AST-2009-003-1.4.diff.txt
upstream: http://downloads.asterisk.org/pub/security/AST-2009-003-1.2.diff.txt (1.2.x)