First published: Wed Jul 09 2008(Updated: )
Multiple unspecified "input validation" vulnerabilities in the Web management interface (aka Messaging Administration interface) in Avaya Message Storage Server (MSS) 3.x and 4.0, and possibly Communication Manager 3.1.x, allow remote authenticated administrators to execute arbitrary commands as user vexvm via vectors related to (1) SFTP Remote Store configuration; (2) remote FTP storage settings; (3) name server lookup; (4) pinging another host; (5) TCP/IP Networking parameter configuration; (6) the external hosts configuration main page; (7) adding and changing external hosts; (8) Windows domain parameter configuration; (9) date, time, and NTP server configuration; (10) alarm settings; (11) the command line history form; (12) the maintenance form; and (13) the server events form.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Avaya Modular Messaging Message Storage Server | =3 | |
Avaya Modular Messaging Message Storage Server | =3.1 | |
Avaya Modular Messaging Message Storage Server | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3081 is classified as a critical vulnerability due to the potential for remote command execution.
To fix CVE-2008-3081, you should apply the latest patches from Avaya for the affected versions of Messaging Storage Server.
CVE-2008-3081 affects remote authenticated administrators using Avaya Messaging Storage Server versions 3.1, 3.x, and 4.0.
Exploiting CVE-2008-3081 allows authenticated attackers to execute arbitrary commands on the server.
CVE-2008-3081 is an input validation vulnerability within the Web management interface of Avaya products.