Vulnerability CVE-2007-6424


Published: 2007-12-18   Modified: 2012-02-12

Description:
registry.pl in Fonality Trixbox 2.0 PBX products, when running in certain environments, reads and executes a set of commands from a remote web site without sufficiently validating the origin of the commands, which allows remote attackers to disable trixbox and execute arbitrary commands via a DNS spoofing attack.

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Fonality -> Trixbox 

 References:
http://www.trixbox.org/forums/trixbox-forums/open-discussion/trixbox-phones-home
http://www.superunknown.org/pivot/entry.php?id=15
http://voipsa.org/pipermail/voipsec_voipsa.org/2007-December/002528.html
http://voipsa.org/pipermail/voipsec_voipsa.org/2007-December/002522.html
http://osvdb.org/44136
http://voipsa.org/pipermail/voipsec_voipsa.org/2007-December/002533.html
http://voipsa.org/pipermail/voipsec_voipsa.org/2007-December/002528.html
http://voipsa.org/blog/2007/12/17/trixbox-contains-phone-home-code-to-retrieve-arbitrary-commands-to-execute/

Copyright 2024, cxsecurity.com

 

Back to Top