First published: Wed Dec 24 2008(Updated: )
Multiple unspecified vulnerabilities in the web management interface in Avaya Communication Manager (CM) 3.1 before 3.1.4 SP2, 4.0 before 4.0.3 SP1, and 5.0 before 5.0 SP3 allow remote authenticated users to execute arbitrary code via unknown attack vectors in the (1) Set Static Routes and (2) Backup History components.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Avaya Communication Manager | =5.0 | |
Avaya Communication Manager | =4.0.1-sp15500 | |
Avaya Communication Manager | =3.1.2 | |
Avaya Communication Manager | =3.1.4-sp1 | |
Avaya Communication Manager | =3.1.1 | |
Avaya Communication Manager | =4.0 | |
Avaya Communication Manager | =4.0.1-sp15215 | |
Avaya Communication Manager | =5.0-sp1 | |
Avaya Communication Manager | =5.0-sp2 | |
Avaya Communication Manager | =4.0.3 | |
Avaya Communication Manager | =3.1.3 | |
Avaya Communication Manager | =4.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5709 is classified as a medium severity vulnerability.
To mitigate CVE-2008-5709, upgrade Avaya Communication Manager to at least version 3.1.4 SP2, 4.0.3 SP1, or 5.0 SP3.
CVE-2008-5709 affects Avaya Communication Manager versions 3.1.x before 3.1.4 SP2, 4.0.x before 4.0.3 SP1, and 5.0.x before 5.0 SP3.
Yes, CVE-2008-5709 can be exploited by remote authenticated users to execute arbitrary code.
The impact of CVE-2008-5709 includes potential unauthorized execution of arbitrary code, which could compromise the integrity of the system.