Nortel UNIStim protocol, as used in Communication Server 1000 and other products, uses predictable sequence numbers, which allows remote attackers to hijack sessions via sniffing or brute force attacks.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 00:56
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/44379 - | |
References | () http://secunia.com/advisories/29747 - | |
References | () http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=713455 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/28691 - | |
References | () http://www.securitytracker.com/id?1019847 - | |
References | () http://www.voipshield.com/research-details.php?id=27&s=4&threats_details=&threats_category=0&threats_vendor=0&limit=20&sort=discovered&sortby=DESC - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/41801 - |
Information
Published : 2009-03-31 17:30
Updated : 2024-11-21 00:56
NVD link : CVE-2008-6564
Mitre link : CVE-2008-6564
CVE.ORG link : CVE-2008-6564
JSON object : View
Products Affected
nortel
- unistim_protocol
- communication_server_1000
CWE