Avaya WinPDM < 3.8.5 Multiple Vulnerabilities

critical Nessus Plugin ID 54831

Synopsis

A phone administration application on the remote Windows host has multiple vulnerabilities.

Description

The version of Avaya WinPDM installed on the remote host has multiple network services affected by memory corruption vulnerabilities. A remote, unauthenticated attacker could exploit these issues to execute arbitrary code.

This plugin determines if the vulnerable software is installed by checking the file version of the Unite Host Router component of WinPDM.

Solution

Upgrade to Avaya WinPDM 3.8.5 (Unite Host Router 4.5.1.5) or later.

See Also

https://downloads.avaya.com/css/P8/documents/100140122

Plugin Details

Severity: Critical

ID: 54831

File Name: avaya_winpdm_3_8_5.nasl

Version: 1.10

Type: local

Agent: windows

Family: Windows

Published: 5/26/2011

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: x-cpe:/a:avaya:winpdm

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/23/2011

Vulnerability Publication Date: 5/23/2011

Exploitable With

Metasploit (Avaya WinPMD UniteHostRouter Buffer Overflow)

ExploitHub (EH-11-070)

Reference Information

BID: 47947

Secunia: 44062