First published: Wed Apr 01 2009(Updated: )
Multiple SQL injection vulnerabilities in Avaya SIP Enablement Services (SES) in Avaya Avaya Communication Manager 3.x, 4.0, and 5.0 (1) allow remote attackers to execute arbitrary SQL commands via unspecified vectors related to profiles in the SIP Personal Information Manager (SPIM) in the web interface; and allow remote authenticated users to execute arbitrary SQL commands via unspecified vectors related to (2) permissions for SPIM profiles in the web interface and (3) a crafted SIP request to the SIP server.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Avaya Aura Communication Manager | <=3.1 | |
Avaya Aura Communication Manager | =3.1.1 | |
Avaya Aura Communication Manager | =3.1.2 | |
Avaya Aura Communication Manager | =3.1.3 | |
Avaya Aura Communication Manager | =3.1.4 | |
Avaya Aura Communication Manager | =3.1.4-sp1 | |
Avaya Aura Communication Manager | =3.1.4-sp2 | |
Avaya Aura Communication Manager | =3.1.5 | |
Avaya Aura Communication Manager | =3.1.5-sp0 | |
Avaya Aura Communication Manager | =4.0 | |
Avaya Aura Communication Manager | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-6573 is classified as a critical vulnerability due to its potential for remote SQL injection attacks that can lead to unauthorized access and data manipulation.
To mitigate CVE-2008-6573, it is recommended to update Avaya Communication Manager to the latest version that includes security patches addressing this vulnerability.
CVE-2008-6573 can enable remote attackers to execute arbitrary SQL commands, potentially leading to data corruption or unauthorized access to sensitive information.
CVE-2008-6573 affects multiple versions of Avaya Communication Manager, including 3.x, 4.0, and 5.0.
Yes, there are known exploits for CVE-2008-6573 that leverage the SQL injection vulnerabilities in the affected Avaya systems.