CVE-2011-2666

NameCVE-2011-2666
DescriptionThe default configuration of the SIP channel driver in Asterisk Open Source 1.4.x through 1.4.41.2 and 1.6.2.x through 1.6.2.18.2 does not enable the alwaysauthreject option, which allows remote attackers to enumerate account names by making a series of invalid SIP requests and observing the differences in the responses for different usernames, a different vulnerability than CVE-2011-2536.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
asterisk (PTS)stretch1:13.14.1~dfsg-2+deb9u4fixed
stretch (security)1:13.14.1~dfsg-2+deb9u5fixed
buster1:16.2.1~dfsg-1+deb10u2fixed
bullseye1:16.16.1~dfsg-1fixed
bullseye (security)1:16.16.1~dfsg-1+deb11u1fixed
bookworm1:16.16.1~dfsg+~2.10-1fixed
sid1:16.23.0~dfsg+~2.10-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
asterisksource(unstable)1:1.8.3.3-1

Notes

[squeeze] - asterisk <no-dsa> (minor issue; can be addressed through configuration)

Search for package or bug name: Reporting problems