The Nortel UNIStim IP Softphone 2050, IP Phone 1140E, and additional Nortel products from the IP Phone, Business Communications Manager (BCM), Mobile Voice Client, and other product lines, allow remote attackers to block calls and force re-registration via a resume message to the Signaling Server that has a spoofed source IP address for the phone. NOTE: the attack is more disruptive if a new spoofed resume message is sent after each re-registration.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 00:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/41772 - | |
References | () http://secunia.com/advisories/27234 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/3274 - | |
References | () http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=654641 - Patch | |
References | () http://www.csnc.ch/static/advisory/csnc/nortel_IP_phone_forced_re-authentication_v1.0.txt - Exploit | |
References | () http://www.securityfocus.com/archive/1/482481/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/26124 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/37254 - |
Information
Published : 2007-10-23 17:46
Updated : 2024-11-21 00:38
NVD link : CVE-2007-5640
Mitre link : CVE-2007-5640
CVE.ORG link : CVE-2007-5640
JSON object : View
Products Affected
nortel
- multimedia_communication_server_5200
- ip_phone_1120e
- ip_phone_1110
- multimedia_communication_server_5100
- business_communications_manager
- communications_server
- ip_phone_2001
- wlan_handset_2211
- centrex_ip_client_manager
- centrex_ip_element_manager
- ip_phone_1140e
- ip_phone_1150e
- wlan_handset_2210
- wlan_handset_6140
- ip_phone_2004
- meridian_option_11c
- wlan_handset_2212
- ip_phone_2002
- mobile_voice_client_2050
- meridian_option_51c
- meridian_option_61c
- meridian_option_81c
- ip_audio_conference_phone_2033
- ip_phone_2007
- wlan_handset_6120
- meridian_sl100
CWE