First published: Mon Aug 25 2008(Updated: )
The remote management interface in SIP Enablement Services (SES) Server in Avaya SIP Enablement Services 5.0, and Communication Manager (CM) 5.0 on the S8300C with SES enabled, proceeds with Core router updates even when a login is invalid, which allows remote attackers to cause a denial of service (messaging outage) or gain privileges via an update request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Avaya Aura SIP Enablement Services | =5.0 | |
Avaya S8300C Server | ||
Avaya Communication Manager | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3778 has a high severity rating as it allows remote attackers to cause denial of service by exploiting the remote management interface.
To fix CVE-2008-3778, apply the latest security patches provided by Avaya for SIP Enablement Services version 5.0 and Communication Manager version 5.0.
CVE-2008-3778 can result in service disruptions as the vulnerability allows unauthorized access that can lead to denial of service.
CVE-2008-3778 affects Avaya SIP Enablement Services 5.0 and Avaya Communication Manager 5.0.
Yes, CVE-2008-3778 can be exploited remotely due to the flaws in the remote management interface.