[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2007-6424Date: (C)2007-12-18   (M)2024-02-22


registry.pl in Fonality Trixbox 2.0 PBX products, when running in certain environments, reads and executes a set of commands from a remote web site without sufficiently validating the origin of the commands, which allows remote attackers to disable trixbox and execute arbitrary commands via a DNS spoofing attack.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.3
Exploit Score: 8.6
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: NONE
Integrity: PARTIAL
Availability: NONE
  
Reference:
OSVDB-44136
http://voipsa.org/pipermail/voipsec_voipsa.org/2007-December/002522.html
http://voipsa.org/pipermail/voipsec_voipsa.org/2007-December/002528.html
http://voipsa.org/pipermail/voipsec_voipsa.org/2007-December/002533.html
http://voipsa.org/blog/2007/12/17/trixbox-contains-phone-home-code-to-retrieve-arbitrary-commands-to-execute/
http://www.superunknown.org/pivot/entry.php?id=15
http://www.trixbox.org/forums/trixbox-forums/open-discussion/trixbox-phones-home

CWE    1
CWE-264

© SecPod Technologies