Unspecified vulnerability in the Web management interface in Avaya SIP Enablement Services (SES) 3.x and 4.0, as used with Avaya Communication Manager 3.1.x and 4.x, allows remote authenticated administrators to gain root privileges via unknown vectors related to configuration of "data viewing or restoring parameters."
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/46604 - | |
References | () http://secunia.com/advisories/30751 - | |
References | () http://support.avaya.com/elmodocs2/security/ASA-2008-268.htm - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/29939 - | |
References | () http://www.voipshield.com/research-details.php?id=77 - | |
References | () http://www.vupen.com/english/advisories/2008/1943/references - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/43390 - |
Information
Published : 2009-04-10 22:00
Updated : 2024-11-21 00:57
NVD link : CVE-2008-6708
Mitre link : CVE-2008-6708
CVE.ORG link : CVE-2008-6708
JSON object : View
Products Affected
avaya
- sip_enablement_services
- communication_manager
CWE