First published: Fri Apr 10 2009(Updated: )
Multiple unspecified vulnerabilities in the Web management interface in Avaya SIP Enablement Services (SES) 3.x and 4.0, as used with Avaya Communication Manager 3.1.x, allow remote attackers to obtain (1) application server configuration, (2) database server configuration including encrypted passwords, (3) a system utility that decrypts "subscriber table passwords," (4) a system utility that decrypts database passwords, and (5) a system utility that encrypts "subscriber table passwords."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Avaya SIP Enablement Services | =3.0 | |
Avaya SIP Enablement Services | =3.1 | |
Avaya SIP Enablement Services | =3.1.1 | |
Avaya SIP Enablement Services | =4.0 | |
Avaya Communication Manager | =3.1 | |
Avaya Communication Manager | =3.1.1 | |
Avaya Communication Manager | =3.1.2 | |
Avaya Communication Manager | =3.1.3 | |
Avaya Communication Manager | =3.1.4 | |
Avaya Communication Manager | =3.1.4-sp1 | |
Avaya Communication Manager | =3.1.4-sp2 | |
Avaya Communication Manager | =3.1.5 | |
Avaya Communication Manager | =3.1.5-sp0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.