Vulnerabilities > Nortel > Multimedia Communication Server 5100
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2009-01-08 | CVE-2008-5872 | Improper Input Validation vulnerability in Nortel Multimedia Communication Server 5100 3.0.13 Multiple unspecified vulnerabilities in the UNIStim File Transfer Protocol (UFTP) processing in IP Client Manager (IPCM) in Nortel Multimedia Communication Server (MSC) 5100 3.0.13 allow remote attackers to cause a denial of service (device outage) via a UFTP message that has a negative block size or other crafted Connection Details values. | 7.8 |
2009-01-08 | CVE-2008-5871 | Credentials Management vulnerability in Nortel Multimedia Communication Server 5100 3.0.13 Nortel Multimedia Communication Server (MSC) 5100 3.0.13 does not verify credentials during call placement, which allows remote attackers to spoof and redirect VoIP calls, possibly related to the snoop command. | 6.4 |
2007-10-23 | CVE-2007-5640 | Remote Denial of Service vulnerability in Nortel UNIStim IP Phone The Nortel UNIStim IP Softphone 2050, IP Phone 1140E, and additional Nortel products from the IP Phone, Business Communications Manager (BCM), Mobile Voice Client, and other product lines, allow remote attackers to block calls and force re-registration via a resume message to the Signaling Server that has a spoofed source IP address for the phone. network nortel | 7.1 |
2007-10-23 | CVE-2007-5638 | Information Exposure vulnerability in Nortel products The Nortel UNIStim IP Softphone 2050, IP Phone 1140E, and additional Nortel products from the IP Phone, Business Communications Manager (BCM), and other product lines, use only 65536 different values in the 32-bit ID number field of an RUDP datagram, which makes it easier for remote attackers to guess the RUDP ID and spoof messages. | 4.3 |
2007-10-23 | CVE-2007-5637 | Information Exposure vulnerability in Nortel products The Nortel UNIStim IP Softphone 2050, IP Phone 1140E, and additional Nortel products from the IP Phone, Business Communications Manager (BCM), and other product lines allow remote attackers to eavesdrop on the physical environment via an Open Audio Stream message that enables "surveillance mode." NOTE: issues relating to a small ID number space can be leveraged to make this attack easier. | 4.3 |