|
|
|
|
| |
Credit:
The original article can be found at: http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=896
|
| |
Vulnerable Systems:
* OmniPCX Enterprise: all versions prior to R9.0
* OmniPCX Enterprise release R9.0: all versions prior to patch H1.301.50 (excluded).The following versions are not vulnerable:
* OmniPCX Enterprise release R9.0 H1.301.50 and more recent.
* OmniPCX Enterprise release R9.1 and later.
The Alcatel-Lucent OmniPCX Enterprise Communication Server (CS) is used to process, manage, and log traditional as well as VOIP based telephony. Part of the maintenance functionality consists of a web based administrative interface consisting of various CGI and PHP based scripts. The vulnerability occurs in the handling of multiple CGI applications that make up the web application.
The vulnerability occurs when parsing certain HTTP headers. String based data from the HTTP request is improperly validated, which can result in a trivial stack based buffer overflow.
Vendor Status:
Alcatel-Lucent has released patches and workarounds to address this vulnerability.
Patch Availability:
www.alcatel-lucent.com/security/psirt
CVE Information:
CVE-2011-0344
Disclosure Timeline:
10/04/2010 Initial Vendor Notification
11/03/2010 Initial Vendor Reply
03/01/2011 Coordinated Public Disclosure
|
|
|
|
|