Some vulnerabilities have been reported in Nortel Multimedia Communication Server 5100, which can be exploited by malicious people to bypass certain security restrictions, conduct spoofing attacks, or cause a DoS (Denial of Service).
1) An implementation error in the call placement mechanism can be exploited to spoof or redirect calls.
2) Multiple errors exist in the implementation of the UNIStim File Transfer Protocol (UFTP). These can be exploited to cause a DoS via UFTP messages containing specially crafted "Connection Details" fields.
The vulnerabilities are reported in version 3.0.13. Other versions may also be affected.
Solution: Use the product only in a trusted network environment.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com
Subject: Nortel Multimedia Communication Server 5100 Multiple Vulnerabilities
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.