Vulnerability Name: | CVE-2008-3778 (CCN-44585) | ||||||||
Assigned: | 2008-08-19 | ||||||||
Published: | 2008-08-19 | ||||||||
Updated: | 2017-08-08 | ||||||||
Summary: | The remote management interface in SIP Enablement Services (SES) Server in Avaya SIP Enablement Services 5.0, and Communication Manager (CM) 5.0 on the S8300C with SES enabled, proceeds with Core router updates even when a login is invalid, which allows remote attackers to cause a denial of service (messaging outage) or gain privileges via an update request. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-264 | ||||||||
Vulnerability Consequences: | Bypass Security | ||||||||
References: | Source: MITRE Type: CNA CVE-2008-3778 Source: CONFIRM Type: UNKNOWN http://support.avaya.com/elmodocs2/security/ASA-2008-347.htm Source: CCN Type: ASA-2008-347 Remote Administration Login Failure Vulnerabilities in Avaya SIP Enablement Services Server Source: CCN Type: Avaya Web site SIP Enablement Services Source: CCN Type: OSVDB ID: 49383 Avaya SIP Enablement Services (SES) Server Remote Management Interface Core Router Update Request Remote DoS Source: BID Type: UNKNOWN 30758 Source: CCN Type: BID-30758 Avaya SES Authentication Bypass Vulnerability and Information Disclosure Weakness Source: XF Type: UNKNOWN avaya-ses-servers-security-bypass(44585) Source: XF Type: UNKNOWN avaya-ses-servers-security-bypass(44585) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |