First published: Fri Apr 10 2009(Updated: )
The Web management interface in Avaya SIP Enablement Services (SES) 3.x and 4.0, as used with Avaya Communication Manager 3.1.x, does not perform authentication for certain functionality, which allows remote attackers to obtain sensitive information and access restricted functionality via (1) the certificate installation utility, (2) unspecified scripts in the objects folder, (3) an "unnecessary default application," (4) unspecified scripts in the states folder, (5) an unspecified "default application" that lists server configuration, and (6) "full system help."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Avaya SIP Enablement Services | =3.0 | |
Avaya SIP Enablement Services | =3.1 | |
Avaya SIP Enablement Services | =3.1.1 | |
Avaya SIP Enablement Services | =4.0 | |
Avaya Communication Manager | =3.1 | |
Avaya Communication Manager | =3.1.1 | |
Avaya Communication Manager | =3.1.2 | |
Avaya Communication Manager | =3.1.3 | |
Avaya Communication Manager | =3.1.4 | |
Avaya Communication Manager | =3.1.4-sp1 | |
Avaya Communication Manager | =3.1.4-sp2 | |
Avaya Communication Manager | =3.1.5 | |
Avaya Communication Manager | =3.1.5-sp0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.