Alcatel-Lucent OmniPCX Enterprise Communication Server (CS) Cookie Buffer Overflow Vulnerability
28 Jan. 2011
Summary
Remote exploitation of a stack based buffer overflow vulnerability in Alcatel-Lucent's OmniPCX Enterprise Communication Server could allow an attacker to execute arbitrary code with the privileges of the affected service
Vulnerable Systems:
* OmniPCX Enterprise: all versions prior to R9.0
* OmniPCX Enterprise release R9.0: all versions prior to patch H1.301.50 (excluded).The following versions are not vulnerable:
* OmniPCX Enterprise release R9.0 H1.301.50 and more recent.
* OmniPCX Enterprise release R9.1 and later.
The Alcatel-Lucent OmniPCX Enterprise Communication Server (CS) is used to process, manage, and log traditional as well as VOIP based telephony. Part of the maintenance functionality consists of a web based administrative interface consisting of various CGI and PHP based scripts. The vulnerability occurs in the handling of multiple CGI applications that make up the web application.
The vulnerability occurs when parsing certain HTTP headers. String based data from the HTTP request is improperly validated, which can result in a trivial stack based buffer overflow.
Vendor Status:
Alcatel-Lucent has released patches and workarounds to address this vulnerability.