Vulnerability CVE-2007-5361


Published: 2007-11-20   Modified: 2012-02-12

Description:
The Communication Server in Alcatel-Lucent OmniPCX Enterprise 7.1 and earlier caches an IP address during a TFTP request from an IP Touch phone, and uses this IP address as the destination for all subsequent VoIP packets to this phone, which allows remote attackers to cause a denial of service (loss of audio) or intercept voice communications via a crafted TFTP request containing the phone's MAC address in the filename.

See advisories in our WLB2 database:
Topic
Author
Date
High
Alcatel OmniPCX Enterprise VoIP Vulnerability
Daniel Stirniman...
24.11.2007

Type:

CWE-Other

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
8.5/10
7.8/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
Complete
Affected software
Alcatel-lucent -> Omnipcx 

 References:
http://securityreason.com/securityalert/3387
http://www.csnc.ch/static/advisory/csnc/alcatel_omnipcx_enterprise_audio_rerouting_vulnerability_v1.0.txt
http://www.securityfocus.com/archive/1/483925/100/0/threaded
http://www.securityfocus.com/bid/26494
http://www.securitytracker.com/id?1018983
http://www.vupen.com/english/advisories/2007/3919
http://www1.alcatel-lucent.com/psirt/statements/2007004/IPTouchDOS.pdf
https://exchange.xforce.ibmcloud.com/vulnerabilities/38560

Copyright 2021, cxsecurity.com

 

Back to Top