Nortel WLAN Handset 2212

CPE Details

Nortel WLAN Handset 2212
-
2007-10-24
10h43 +00:00
2008-04-07
12h46 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:h:nortel:wlan_handset_2212:-:*:*:*:*:*:*:*

Informations

Vendor

nortel

Product

wlan_handset_2212

Version

-

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2007-5637 2007-10-23 15h00 +00:00 The Nortel UNIStim IP Softphone 2050, IP Phone 1140E, and additional Nortel products from the IP Phone, Business Communications Manager (BCM), and other product lines allow remote attackers to eavesdrop on the physical environment via an Open Audio Stream message that enables "surveillance mode." NOTE: issues relating to a small ID number space can be leveraged to make this attack easier.
4.3
CVE-2007-5638 2007-10-23 15h00 +00:00 The Nortel UNIStim IP Softphone 2050, IP Phone 1140E, and additional Nortel products from the IP Phone, Business Communications Manager (BCM), and other product lines, use only 65536 different values in the 32-bit ID number field of an RUDP datagram, which makes it easier for remote attackers to guess the RUDP ID and spoof messages. NOTE: this can be leveraged for an eavesdropping attack by sending many Open Audio Stream messages.
4.3
CVE-2007-5639 2007-10-23 15h00 +00:00 The Nortel UNIStim IP Softphone 2050, IP Phone 1140E, and other Nortel IP Phone, Mobile Voice Client, and WLAN Handsets products allow remote attackers to cause a denial of service (device hang) via a flood of Mute and UnMute messages that have a spoofed source IP address for the Signaling Server.
7.1
CVE-2007-5640 2007-10-23 15h00 +00:00 The Nortel UNIStim IP Softphone 2050, IP Phone 1140E, and additional Nortel products from the IP Phone, Business Communications Manager (BCM), Mobile Voice Client, and other product lines, allow remote attackers to block calls and force re-registration via a resume message to the Signaling Server that has a spoofed source IP address for the phone. NOTE: the attack is more disruptive if a new spoofed resume message is sent after each re-registration.
7.1