Avaya Message Networking 3.1

CPE Details

Avaya Message Networking 3.1
3.1
2007-11-07
02h40 +00:00
2007-11-07
02h40 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:avaya:message_networking:3.1:*:*:*:*:*:*:*

Informations

Vendor

avaya

Product

message_networking

Version

3.1

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2009-0115 2009-03-30 14h00 +00:00 The Device Mapper multipathing driver (aka multipath-tools or device-mapper-multipath) 0.4.8, as used in SUSE openSUSE, SUSE Linux Enterprise Server (SLES), Fedora, and possibly other operating systems, uses world-writable permissions for the socket file (aka /var/run/multipathd.sock), which allows local users to send arbitrary commands to the multipath daemon.
7.8
High
CVE-2008-2812 2008-07-08 22h00 +00:00 The Linux kernel before 2.6.25.10 does not properly perform tty operations, which allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving NULL pointer dereference of function pointers in (1) hamradio/6pack.c, (2) hamradio/mkiss.c, (3) irda/irtty-sir.c, (4) ppp_async.c, (5) ppp_synctty.c, (6) slip.c, (7) wan/x25_asy.c, and (8) wireless/strip.c in drivers/net/.
7.8
High
CVE-2007-5830 2007-11-05 18h00 +00:00 Unspecified vulnerability in the administrative interface in Avaya Messaging Storage Server (MSS) 3.1 before SP1, and Message Networking (MN) 3.1, allows remote attackers to cause a denial of service via unspecified vectors related to "input validation."
7.8
CVE-2006-1058 2006-04-04 08h00 +00:00 BusyBox 1.1.1 does not use a salt when generating passwords, which makes it easier for local users to guess passwords from a stolen password file using techniques such as rainbow tables.
5.5
Medium
CVE-2001-1494 2005-06-21 02h00 +00:00 script command in the util-linux package before 2.11n allows local users to overwrite arbitrary files by setting a hardlink from the typescript log file to any file on the system, then having root execute the script command.
5.5
Medium