Vulnerability Name:

CVE-2008-6706 (CCN-43382)

Assigned:2008-06-25
Published:2008-06-25
Updated:2017-08-17
Summary:Multiple unspecified vulnerabilities in the Web management interface in Avaya SIP Enablement Services (SES) 3.x and 4.0, as used with Avaya Communication Manager 3.1.x, allow remote attackers to obtain (1) application server configuration, (2) database server configuration including encrypted passwords, (3) a system utility that decrypts "subscriber table passwords," (4) a system utility that decrypts database passwords, and (5) a system utility that encrypts "subscriber table passwords."
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:7.8 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:N/A:N)
6.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:N/A:N/E:U/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): None
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
4.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-noinfo
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2008-6706

Source: OSVDB
Type: UNKNOWN
46602

Source: CCN
Type: SA30751
Avaya SIP Enablement Services Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
30751

Source: CONFIRM
Type: Vendor Advisory
http://support.avaya.com/elmodocs2/security/ASA-2008-268.htm

Source: CCN
Type: ASA-2008-268
Additional Input Validation Vulnerabilities in Avaya SES SIP Server

Source: CCN
Type: Avaya Web site
Telecommunication Systems by Avaya: Business Telecommunications for your Company

Source: CCN
Type: OSVDB ID: 46602
Avaya SIP Enablement Services (SES) Web Admin Interface Server Configuration Information Disclosure

Source: BID
Type: UNKNOWN
29939

Source: CCN
Type: BID-29939
Avaya Communication Manager Multiple Security Vulnerabilities

Source: MISC
Type: UNKNOWN
http://www.voipshield.com/research-details.php?id=81

Source: MISC
Type: UNKNOWN
http://www.voipshield.com/research-details.php?id=82

Source: CCN
Type: VoIP Security Advisory, 2008-06-25
SIP Enablement Service Web Interface Password Decryption Utility Disclosure

Source: MISC
Type: UNKNOWN
http://www.voipshield.com/research-details.php?id=83

Source: MISC
Type: UNKNOWN
http://www.voipshield.com/research-details.php?id=84

Source: MISC
Type: UNKNOWN
http://www.voipshield.com/research-details.php?id=85

Source: VUPEN
Type: UNKNOWN
ADV-2008-1943

Source: XF
Type: UNKNOWN
avaya-ses-tablepasswords-info-disclosure(43382)

Source: XF
Type: UNKNOWN
avaya-ses-tablepasswords-info-disclosure(43382)

Source: XF
Type: UNKNOWN
avaya-ses-passwordencryption-info-disclosure(43383)

Source: XF
Type: UNKNOWN
avaya-ses-databasepassword-info-disclosure(43387)

Source: XF
Type: UNKNOWN
avaya-ses-databaseserver-info-disclosure(43388)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:avaya:sip_enablement_services:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:avaya:sip_enablement_services:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:avaya:sip_enablement_services:3.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:avaya:sip_enablement_services:4.0:*:*:*:*:*:*:*
  • AND
  • cpe:/a:avaya:communication_manager:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:avaya:communication_manager:3.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:avaya:communication_manager:3.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:avaya:communication_manager:3.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:avaya:communication_manager:3.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:avaya:communication_manager:3.1.4:sp1:*:*:*:*:*:*
  • OR cpe:/a:avaya:communication_manager:3.1.4:sp2:*:*:*:*:*:*
  • OR cpe:/a:avaya:communication_manager:3.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:avaya:communication_manager:3.1.5:sp0:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:avaya:communication_manager:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:avaya:communication_manager:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:avaya:communication_manager:3.1.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    avaya sip enablement services 3.0
    avaya sip enablement services 3.1
    avaya sip enablement services 3.1.1
    avaya sip enablement services 4.0
    avaya communication manager 3.1
    avaya communication manager 3.1.1
    avaya communication manager 3.1.2
    avaya communication manager 3.1.3
    avaya communication manager 3.1.4
    avaya communication manager 3.1.4 sp1
    avaya communication manager 3.1.4 sp2
    avaya communication manager 3.1.5
    avaya communication manager 3.1.5 sp0
    avaya communication manager 3.1
    avaya communication manager 4.0
    avaya communication manager 3.1.1