First published: Wed Sep 19 2007(Updated: )
Multiple buffer overflows in unspecified ActiveX controls in COM objects in Avaya IP Softphone R5.2 before SP3, and R6.0, allow remote attackers to execute arbitrary code via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Avaya IP Softphone | <=5.2 | |
Avaya IP Softphone | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3286 is considered critical due to its potential to allow remote code execution.
To fix CVE-2007-3286, update to Avaya IP Softphone version 5.2 SP3 or later, or version 6.0 SP2 and later.
Users vulnerable to CVE-2007-3286 may be at risk of arbitrary code execution, potentially compromising the integrity of their systems.
CVE-2007-3286 affects Avaya IP Softphone versions prior to SP3 for R5.2 and version R6.0.
Yes, CVE-2007-3286 can be exploited remotely, allowing attackers to execute arbitrary code without user intervention.