First published: Fri Mar 29 2013(Updated: )
The SIP channel driver in Asterisk Open Source 1.8.x before 1.8.20.2, 10.x before 10.12.2, and 11.x before 11.2.2; Certified Asterisk 1.8.15 before 1.8.15-cert2; Asterisk Business Edition (BE) C.3.x before C.3.8.1; and Asterisk Digiumphones 10.x-digiumphones before 10.12.2-digiumphones exhibits different behavior for invalid INVITE, SUBSCRIBE, and REGISTER transactions depending on whether the user account exists, which allows remote attackers to enumerate account names by (1) reading HTTP status codes, (2) reading additional text in a 403 (aka Forbidden) response, or (3) observing whether certain retransmissions occur.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asterisk | =1.8.0 | |
Asterisk | =1.8.0-beta1 | |
Asterisk | =1.8.0-beta2 | |
Asterisk | =1.8.0-beta3 | |
Asterisk | =1.8.0-beta4 | |
Asterisk | =1.8.0-beta5 | |
Asterisk | =1.8.0-rc2 | |
Asterisk | =1.8.0-rc3 | |
Asterisk | =1.8.0-rc4 | |
Asterisk | =1.8.0-rc5 | |
Asterisk | =1.8.1 | |
Asterisk | =1.8.1-rc1 | |
Asterisk | =1.8.1.1 | |
Asterisk | =1.8.1.2 | |
Asterisk | =1.8.2 | |
Asterisk | =1.8.2-rc1 | |
Asterisk | =1.8.2.1 | |
Asterisk | =1.8.2.2 | |
Asterisk | =1.8.2.3 | |
Asterisk | =1.8.2.4 | |
Asterisk | =1.8.3 | |
Asterisk | =1.8.3-rc1 | |
Asterisk | =1.8.3-rc2 | |
Asterisk | =1.8.3-rc3 | |
Asterisk | =1.8.3.1 | |
Asterisk | =1.8.3.2 | |
Asterisk | =1.8.3.3 | |
Asterisk | =1.8.4 | |
Asterisk | =1.8.4-rc1 | |
Asterisk | =1.8.4-rc2 | |
Asterisk | =1.8.4-rc3 | |
Asterisk | =1.8.4.1 | |
Asterisk | =1.8.4.2 | |
Asterisk | =1.8.4.3 | |
Asterisk | =1.8.4.4 | |
Asterisk | =1.8.5-rc1 | |
Asterisk | =1.8.5.0 | |
Asterisk | =1.8.6.0 | |
Asterisk | =1.8.6.0-rc1 | |
Asterisk | =1.8.6.0-rc2 | |
Asterisk | =1.8.6.0-rc3 | |
Asterisk | =1.8.7.0 | |
Asterisk | =1.8.7.0-rc1 | |
Asterisk | =1.8.7.0-rc2 | |
Asterisk | =1.8.7.1 | |
Asterisk | =1.8.7.2 | |
Asterisk | =1.8.8.0 | |
Asterisk | =1.8.8.0-rc1 | |
Asterisk | =1.8.8.0-rc2 | |
Asterisk | =1.8.8.0-rc3 | |
Asterisk | =1.8.8.0-rc4 | |
Asterisk | =1.8.8.0-rc5 | |
Asterisk | =1.8.8.1 | |
Asterisk | =1.8.8.2 | |
Asterisk | =1.8.9.0 | |
Asterisk | =1.8.9.0-rc1 | |
Asterisk | =1.8.9.0-rc2 | |
Asterisk | =1.8.9.0-rc3 | |
Asterisk | =1.8.9.1 | |
Asterisk | =1.8.9.2 | |
Asterisk | =1.8.9.3 | |
Asterisk | =1.8.10.0 | |
Asterisk | =1.8.10.0-rc1 | |
Asterisk | =1.8.10.0-rc2 | |
Asterisk | =1.8.10.0-rc3 | |
Asterisk | =1.8.10.0-rc4 | |
Asterisk | =1.8.10.1 | |
Asterisk | =1.8.11.0 | |
Asterisk | =1.8.11.0-rc2 | |
Asterisk | =1.8.11.0-rc3 | |
Asterisk | =1.8.11.1 | |
Asterisk | =1.8.12 | |
Asterisk | =1.8.12.0-rc1 | |
Asterisk | =1.8.12.0-rc2 | |
Asterisk | =1.8.12.0-rc3 | |
Asterisk | =1.8.12.1 | |
Asterisk | =1.8.12.2 | |
Asterisk | =1.8.13.0 | |
Asterisk | =1.8.13.0-rc1 | |
Asterisk | =1.8.13.0-rc2 | |
Asterisk | =1.8.13.1 | |
Asterisk | =1.8.14.0 | |
Asterisk | =1.8.14.0-rc1 | |
Asterisk | =1.8.14.0-rc2 | |
Asterisk | =1.8.14.1 | |
Asterisk | =1.8.15.0 | |
Asterisk | =1.8.15.0-rc1 | |
Asterisk | =1.8.15.1 | |
Asterisk | =1.8.16.0 | |
Asterisk | =1.8.16.0-rc1 | |
Asterisk | =1.8.16.0-rc2 | |
Asterisk | =1.8.17.0 | |
Asterisk | =1.8.17.0-rc1 | |
Asterisk | =1.8.17.0-rc2 | |
Asterisk | =1.8.17.0-rc3 | |
Asterisk | =1.8.18.0 | |
Asterisk | =1.8.18.0-rc1 | |
Asterisk | =1.8.18.1 | |
Asterisk | =1.8.19.0 | |
Asterisk | =1.8.19.0-rc1 | |
Asterisk | =1.8.19.0-rc3 | |
Asterisk | =1.8.19.1 | |
Asterisk | =1.8.20.0 | |
Asterisk | =1.8.20.0-rc1 | |
Asterisk | =1.8.20.0-rc2 | |
Asterisk | =1.8.20.1 | |
Asterisk | =10.0.0 | |
Asterisk | =10.0.0-beta1 | |
Asterisk | =10.0.0-beta2 | |
Asterisk | =10.0.0-rc1 | |
Asterisk | =10.0.0-rc2 | |
Asterisk | =10.0.0-rc3 | |
Asterisk | =10.0.1 | |
Asterisk | =10.1.0 | |
Asterisk | =10.1.0-rc1 | |
Asterisk | =10.1.0-rc2 | |
Asterisk | =10.1.1 | |
Asterisk | =10.1.2 | |
Asterisk | =10.1.3 | |
Asterisk | =10.2.0 | |
Asterisk | =10.2.0-rc1 | |
Asterisk | =10.2.0-rc2 | |
Asterisk | =10.2.0-rc3 | |
Asterisk | =10.2.0-rc4 | |
Asterisk | =10.2.1 | |
Asterisk | =10.3.0 | |
Asterisk | =10.3.0-rc2 | |
Asterisk | =10.3.0-rc3 | |
Asterisk | =10.3.1 | |
Asterisk | =10.4.0 | |
Asterisk | =10.4.0-rc1 | |
Asterisk | =10.4.0-rc2 | |
Asterisk | =10.4.0-rc3 | |
Asterisk | =10.4.1 | |
Asterisk | =10.4.2 | |
Asterisk | =10.5.0 | |
Asterisk | =10.5.0-rc1 | |
Asterisk | =10.5.0-rc2 | |
Asterisk | =10.5.1 | |
Asterisk | =10.5.2 | |
Asterisk | =10.6.0 | |
Asterisk | =10.6.0-rc1 | |
Asterisk | =10.6.0-rc2 | |
Asterisk | =10.6.1 | |
Asterisk | =10.7.0 | |
Asterisk | =10.7.0-rc1 | |
Asterisk | =10.7.1 | |
Asterisk | =10.8.0 | |
Asterisk | =10.8.0-rc1 | |
Asterisk | =10.8.0-rc2 | |
Asterisk | =10.9.0 | |
Asterisk | =10.9.0-rc1 | |
Asterisk | =10.9.0-rc2 | |
Asterisk | =10.9.0-rc3 | |
Asterisk | =10.10.0 | |
Asterisk | =10.10.0-rc1 | |
Asterisk | =10.10.0-rc2 | |
Asterisk | =10.10.1 | |
Asterisk | =10.11.0 | |
Asterisk | =10.11.0-rc1 | |
Asterisk | =10.11.0-rc3 | |
Asterisk | =10.11.1 | |
Asterisk | =10.12.0 | |
Asterisk | =10.12.0-rc1 | |
Asterisk | =10.12.0-rc2 | |
Asterisk | =10.12.1 | |
Asterisk | =11.0.0 | |
Asterisk | =11.0.0-beta1 | |
Asterisk | =11.0.0-beta2 | |
Asterisk | =11.0.0-rc1 | |
Asterisk | =11.0.0-rc2 | |
Asterisk | =11.0.1 | |
Asterisk | =11.0.2 | |
Asterisk | =11.1.0 | |
Asterisk | =11.1.0-rc1 | |
Asterisk | =11.1.0-rc3 | |
Asterisk | =11.1.1 | |
Asterisk | =11.1.2 | |
Asterisk | =11.2.0 | |
Asterisk | =11.2.0-rc1 | |
Asterisk | =11.2.0-rc2 | |
Asterisk | =11.2.1 | |
Asterisk | =1.8.15-cert1 | |
Asterisk | =1.8.15-cert1 | |
Asterisk | =1.8.15-cert1 | |
Asterisk | =1.8.15-cert1 | |
Asterisk | =1.8.15.0 | |
Asterisk | =1.8.15.0-rc1 | |
Digium Asterisk | =c.3.2.2 | |
Digium Asterisk | =c.3.3 | |
Digium Asterisk | =c.3.3.2 | |
Digium Asterisk Digiumphones | =10.0.0 | |
Digium Asterisk Digiumphones | =10.0.0-beta1 | |
Digium Asterisk Digiumphones | =10.0.0-beta2 | |
Digium Asterisk Digiumphones | =10.0.0-rc1 | |
Digium Asterisk Digiumphones | =10.0.0-rc2 | |
Digium Asterisk Digiumphones | =10.0.0-rc3 | |
Digium Asterisk Digiumphones | =10.1.0 | |
Digium Asterisk Digiumphones | =10.1.0-rc1 | |
Digium Asterisk Digiumphones | =10.1.0-rc2 | |
Digium Asterisk Digiumphones | =10.2.0 | |
Digium Asterisk Digiumphones | =10.2.0-rc1 | |
Digium Asterisk Digiumphones | =10.2.0-rc2 | |
Digium Asterisk Digiumphones | =10.2.0-rc3 | |
Digium Asterisk Digiumphones | =10.2.0-rc4 | |
Digium Asterisk Digiumphones | =10.3.0 | |
Digium Asterisk Digiumphones | =10.3.0-rc2 | |
Digium Asterisk Digiumphones | =10.3.0-rc3 | |
Digium Asterisk Digiumphones | =10.4.0 | |
Digium Asterisk Digiumphones | =10.4.0-rc1 | |
Digium Asterisk Digiumphones | =10.4.0-rc2 | |
Digium Asterisk Digiumphones | =10.4.0-rc3 | |
Digium Asterisk Digiumphones | =10.5.0 | |
Digium Asterisk Digiumphones | =10.5.0-rc1 | |
Digium Asterisk Digiumphones | =10.5.0-rc2 | |
Digium Asterisk Digiumphones | =10.6.0 | |
Digium Asterisk Digiumphones | =10.6.0-rc1 | |
Digium Asterisk Digiumphones | =10.6.0-rc2 | |
Digium Asterisk Digiumphones | =10.7.0 | |
Digium Asterisk Digiumphones | =10.7.0-rc1 | |
Digium Asterisk Digiumphones | =10.8.0 | |
Digium Asterisk Digiumphones | =10.8.0-rc1 | |
Digium Asterisk Digiumphones | =10.8.0-rc2 | |
Digium Asterisk Digiumphones | =10.9.0-rc1 | |
Digium Asterisk Digiumphones | =10.10.0 | |
Digium Asterisk Digiumphones | =10.10.0-rc1 | |
Digium Asterisk Digiumphones | =10.10.0-rc2 | |
Digium Asterisk Digiumphones | =10.11.0 | |
Digium Asterisk Digiumphones | =10.11.0-rc1 | |
Digium Asterisk Digiumphones | =10.11.0-rc2 | |
Digium Asterisk Digiumphones | =10.11.0-rc3 | |
Digium Asterisk Digiumphones | =10.12.0 | |
Digium Asterisk Digiumphones | =10.12.0-rc1 | |
Digium Asterisk Digiumphones | =10.12.0-rc2 | |
Digium Asterisk Digiumphones | =10.12.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2264 has been assigned a CVSS score that indicates a high severity level due to potential denial of service attacks.
To address CVE-2013-2264, update Asterisk to version 1.8.20.2, 10.12.2, or 11.2.2, or apply the appropriate patches.
CVE-2013-2264 affects various Asterisk versions, including Open Source Asterisk versions 1.8.x less than 1.8.20.2, 10.x less than 10.12.2, and 11.x less than 11.2.2.
A temporary workaround for CVE-2013-2264 involves disabling the SIP protocol on affected systems, though upgrading is the recommended solution.
CVE-2013-2264 is classified as a vulnerability in the SIP channel driver of Asterisk that may allow remote attackers to cause a denial of service.