The Communication Server in Alcatel-Lucent OmniPCX Enterprise 7.1 and earlier caches an IP address during a TFTP request from an IP Touch phone, and uses this IP address as the destination for all subsequent VoIP packets to this phone, which allows remote attackers to cause a denial of service (loss of audio) or intercept voice communications via a crafted TFTP request containing the phone's MAC address in the filename.
References
Configurations
History
21 Nov 2024, 00:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/40522 - | |
References | () http://secunia.com/advisories/27710 - | |
References | () http://securityreason.com/securityalert/3387 - | |
References | () http://www.csnc.ch/static/advisory/csnc/alcatel_omnipcx_enterprise_audio_rerouting_vulnerability_v1.0.txt - | |
References | () http://www.securityfocus.com/archive/1/483925/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/26494 - | |
References | () http://www.securitytracker.com/id?1018983 - | |
References | () http://www.vupen.com/english/advisories/2007/3919 - | |
References | () http://www1.alcatel-lucent.com/psirt/statements/2007004/IPTouchDOS.pdf - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/38560 - |
Information
Published : 2007-11-20 19:46
Updated : 2024-11-21 00:37
NVD link : CVE-2007-5361
Mitre link : CVE-2007-5361
CVE.ORG link : CVE-2007-5361
JSON object : View
Products Affected
alcatel-lucent
- omnipcx
CWE