Pingtel Xpressa Phone Weak会议参数漏洞

漏洞信息详情

Pingtel Xpressa Phone Weak会议参数漏洞

漏洞简介

从Pingtel Xpressa 1.2.5 到2.0.1版本使用会话标识协议(SIP)请求的预测(1) Call-ID, (2) CSeq,和 (3) \”To\” 和 \”From\” SIP URL值。远程攻击者避免SIP注册登记。

漏洞公告

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .
@securityfocus.com>

参考网址

来源: www.sys-security.com
链接:http://www.sys-security.com/archive/advisories/More_Vulnerabilities_with_Pingtel_xpressa_SIP-based_IP_phones.txt

来源: BID
名称: 5537
链接:http://www.securityfocus.com/bid/5537

来源: XF
名称: pingtel-xpressa-weak-parameters(9949)
链接:http://www.iss.net/security_center/static/9949.php

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享