CVE-2008-3778
Published Aug 25, 2008
Last updated 7 years ago
Overview
- Description
- The remote management interface in SIP Enablement Services (SES) Server in Avaya SIP Enablement Services 5.0, and Communication Manager (CM) 5.0 on the S8300C with SES enabled, proceeds with Core router updates even when a login is invalid, which allows remote attackers to cause a denial of service (messaging outage) or gain privileges via an update request.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:avaya:sip_enablement_services:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "03BEFE21-9FAA-4DA0-9C75-A70C12A88123" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:avaya:s8300c_server:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8030330C-BC31-485A-A93C-AEA910D4042C" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:avaya:communication_manager:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "84E2136B-6FE3-4548-A89D-444ED9393C22" } ], "operator": "OR" } ], "operator": "AND" } ]