Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.100341 |
Kategorie: | General |
Titel: | Asterisk SIP Response Username Enumeration Remote Information Disclosure Vulnerability |
Zusammenfassung: | Asterisk is prone to an information-disclosure vulnerability because; it doesn't provide safe responses to failed authentication attempts. |
Beschreibung: | Summary: Asterisk is prone to an information-disclosure vulnerability because it doesn't provide safe responses to failed authentication attempts. Vulnerability Impact: Attackers can exploit this issue to discover whether specific usernames exist. Information harvested may aid in launching further attacks. Solution: The vendor has released an advisory and updates. Please see the references for details. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N |
Querverweis: |
BugTraq ID: 36924 Common Vulnerability Exposure (CVE) ID: CVE-2009-3727 http://www.securityfocus.com/bid/36924 Debian Security Information: DSA-1952 (Google Search) http://www.debian.org/security/2009/dsa-1952 https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00789.html https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00838.html http://osvdb.org/59697 http://www.securitytracker.com/id?1023133 http://secunia.com/advisories/37265 http://secunia.com/advisories/37479 http://secunia.com/advisories/37677 |
Copyright | This script is Copyright (C) 2009 Greenbone Networks GmbH |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |