ID CVE-2008-6797
Summary The server in Mitel NuPoint Messenger R11 and R3 sends usernames and passwords in cleartext to Exchange servers, which allows remote attackers to obtain sensitive information by sniffing the network.
References
Vulnerable Configurations
  • cpe:2.3:a:mitel:mitel_nupoint_messenger:r3:*:*:*:*:*:*:*
    cpe:2.3:a:mitel:mitel_nupoint_messenger:r3:*:*:*:*:*:*:*
  • cpe:2.3:a:mitel:mitel_nupoint_messenger:r11:*:*:*:*:*:*:*
    cpe:2.3:a:mitel:mitel_nupoint_messenger:r11:*:*:*:*:*:*:*
CVSS
Base: 7.8 (as of 08-05-2009 - 04:00)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:N/A:N
refmap via4
bid 34847
cert-vn VU#576996
misc http://www.mitel.com/resources/NuPoint_and_Exchange.pdf
Last major update 08-05-2009 - 04:00
Published 07-05-2009 - 18:30
Last modified 08-05-2009 - 04:00
Back to Top