CVE-2009-3727

N/A Unknown
Published: November 10, 2009 Modified: April 23, 2026
View on NVD

Description

Asterisk Open Source 1.2.x before 1.2.35, 1.4.x before 1.4.26.3, 1.6.0.x before 1.6.0.17, and 1.6.1.x before 1.6.1.9; Business Edition A.x.x, B.x.x before B.2.5.12, C.2.x.x before C.2.4.5, and C.3.x.x before C.3.2.2; AsteriskNOW 1.5; and s800i 1.3.x before 1.3.0.5 generate different error messages depending on whether a SIP username is valid, which allows remote attackers to enumerate valid usernames via multiple crafted REGISTER messages with inconsistent usernames in the URI in the To header and the Digest in the Authorization header.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://downloads.asterisk.org/pub/security/AST-2009-008.html
Source: secalert@redhat.com
Vendor Advisory
http://osvdb.org/59697
Source: secalert@redhat.com
http://secunia.com/advisories/37265
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/37479
Source: secalert@redhat.com
http://secunia.com/advisories/37677
Source: secalert@redhat.com
http://www.securityfocus.com/bid/36924
Source: secalert@redhat.com
Patch
http://downloads.asterisk.org/pub/security/AST-2009-008.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://osvdb.org/59697
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/37265
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37479
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/37677
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2009/dsa-1952
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/36924
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.securitytracker.com/id?1023133
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.redhat.com/show_bug.cgi?id=523277
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.redhat.com/show_bug.cgi?id=533137
Source: af854a3a-2127-422b-91ae-364da2661108

24 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.7%
73th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

digium