ID

VAR-200512-0526


CVE

CVE-2005-3989


TITLE

Avaya TN2602AP IP Media Resource 320 Remote Denial of Service Vulnerability

Trust: 0.9

sources: BID: 15668 // CNNVD: CNNVD-200512-060

DESCRIPTION

Memory leak in Avaya TN2602AP IP Media Resource 320 circuit pack before vintage 9 firmware allows remote attackers to cause a denial of service (memory consumption) via crafted VoIP packets. Avaya TN2602AP IP Media Resource 320 is prone to a remote denial of service vulnerability. A successful attack can result in a memory leak and lead to a denial of service condition due to a crash. Avaya TN2602AP IP Media Resource 320 versions prior to vintage 9 firmware are vulnerable to this issue. The vulnerability is caused due to an unspecified error. This can be exploited to cause memory leaks, which can potentially cause a DoS via specially crafted packets. SOLUTION: Update to vintage 9 firmware. http://support.avaya.com/japple/css/japple?temp.documentID=236667&temp.productID=136527&temp.releaseID=228560&temp.bucketID=108025&PAGE=Document#TN2602 PROVIDED AND/OR DISCOVERED BY: Reported by vendor. ORIGINAL ADVISORY: http://support.avaya.com/elmodocs2/security/ASA-2005-231.pdf ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.35

sources: NVD: CVE-2005-3989 // BID: 15668 // VULHUB: VHN-15197 // PACKETSTORM: 41989

AFFECTED PRODUCTS

vendor:avayamodel:tn2602ap ip media resource 320 circuit packscope:eqversion:vintage_6_firmware

Trust: 1.6

vendor:avayamodel:tn2602ap ip media resource 320 circuit packscope:eqversion:vintage_5_firmware

Trust: 1.6

vendor:avayamodel:tn2602ap ip media resource 320 circuit packscope:eqversion:vintage_3_firmware

Trust: 1.6

vendor:avayamodel:tn2602ap ip media resource 320 circuit packscope:eqversion:vintage_4_firmware

Trust: 1.6

vendor:avayamodel:tn2602ap ip media resource 320 circuit packscope:eqversion:vintage_7_firmware

Trust: 1.6

vendor:avayamodel:tn2602ap ip media resource 320 circuit packscope:lteversion:vintage_8_firmware

Trust: 1.0

vendor:avayamodel:tn2602ap ip media resource 320 circuit packscope:eqversion:vintage_8_firmware

Trust: 0.6

vendor:avayamodel:tn2602ap ip media resource vintagescope:eqversion:3207

Trust: 0.3

vendor:avayamodel:tn2602ap ip media resource vintagescope:eqversion:3206

Trust: 0.3

vendor:avayamodel:tn2602ap ip media resource vintagescope:eqversion:3205

Trust: 0.3

vendor:avayamodel:tn2602ap ip media resource vintagescope:eqversion:3204

Trust: 0.3

vendor:avayamodel:tn2602ap ip media resource vintagescope:eqversion:3203

Trust: 0.3

vendor:avayamodel:tn2602ap ip media resource vintagescope:neversion:3209

Trust: 0.3

sources: BID: 15668 // CNNVD: CNNVD-200512-060 // NVD: CVE-2005-3989

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-3989
value: HIGH

Trust: 1.0

CNNVD: CNNVD-200512-060
value: HIGH

Trust: 0.6

VULHUB: VHN-15197
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2005-3989
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-15197
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-15197 // CNNVD: CNNVD-200512-060 // NVD: CVE-2005-3989

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-3989

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200512-060

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200512-060

EXTERNAL IDS

db:BIDid:15668

Trust: 2.0

db:SECUNIAid:17825

Trust: 1.8

db:VUPENid:ADV-2005-2685

Trust: 1.7

db:NVDid:CVE-2005-3989

Trust: 1.7

db:CNNVDid:CNNVD-200512-060

Trust: 0.7

db:VULHUBid:VHN-15197

Trust: 0.1

db:PACKETSTORMid:41989

Trust: 0.1

sources: VULHUB: VHN-15197 // BID: 15668 // PACKETSTORM: 41989 // CNNVD: CNNVD-200512-060 // NVD: CVE-2005-3989

REFERENCES

url:http://support.avaya.com/elmodocs2/security/asa-2005-231.pdf

Trust: 2.1

url:http://www.securityfocus.com/bid/15668

Trust: 1.7

url:http://secunia.com/advisories/17825

Trust: 1.7

url:http://www.vupen.com/english/advisories/2005/2685

Trust: 1.1

url:http://www.frsirt.com/english/advisories/2005/2685

Trust: 0.6

url:http://support.avaya.com/japple/css/japple?temp.documentid=236667&temp.productid=136527&temp.releaseid=228560&temp.bucketid=108025&page=document#tn2602

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/17825/

Trust: 0.1

url:http://secunia.com/product/6292/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-15197 // BID: 15668 // PACKETSTORM: 41989 // CNNVD: CNNVD-200512-060 // NVD: CVE-2005-3989

CREDITS

Avaya

Trust: 0.6

sources: CNNVD: CNNVD-200512-060

SOURCES

db:VULHUBid:VHN-15197
db:BIDid:15668
db:PACKETSTORMid:41989
db:CNNVDid:CNNVD-200512-060
db:NVDid:CVE-2005-3989

LAST UPDATE DATE

2024-08-14T14:53:39.304000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-15197date:2011-03-08T00:00:00
db:BIDid:15668date:2005-11-30T00:00:00
db:CNNVDid:CNNVD-200512-060date:2005-12-07T00:00:00
db:NVDid:CVE-2005-3989date:2011-03-08T02:27:31.393

SOURCES RELEASE DATE

db:VULHUBid:VHN-15197date:2005-12-04T00:00:00
db:BIDid:15668date:2005-11-30T00:00:00
db:PACKETSTORMid:41989date:2005-12-01T18:48:38
db:CNNVDid:CNNVD-200512-060date:2005-12-04T00:00:00
db:NVDid:CVE-2005-3989date:2005-12-04T22:03:00