[cisco-voip] Have you seen this article?

Lelio Fulgenzi lelio at uoguelph.ca
Wed Jun 28 09:59:55 EDT 2006


There's a CallManager 4.3(1)? WAH?????????????????????

--------------------------------------------------------------------------------
Lelio Fulgenzi, B.A.
Senior Analyst (CCS) * University of Guelph * Guelph, Ontario N1G 2W1
(519) 824-4120 x56354 (519) 767-1060 FAX (JNHN)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 
"I can eat fifty eggs." "Nobody can eat fifty eggs."
  ----- Original Message ----- 
  From: Ryan Ratliff 
  To: Leetun, Rob 
  Cc: ciscovoip 
  Sent: Wednesday, June 28, 2006 9:36 AM
  Subject: Re: [cisco-voip] Have you seen this article?


  http://www.cisco.com/en/US/products/sw/voicesw/ps556/ 
  tsd_products_security_response09186a00806c0846.html

  -Ryan

  On Jun 28, 2006, at 9:17 AM, Leetun, Rob wrote:

    Cisco Call Manager Flaw Could Invite Hackers

  Vulnerabilities in Cisco's Call Manager software could open the door  
  for hackers to reconfigure VoIP settings and gain access to  
  individual users' account information, according to researchers at  
  Kansas City, Mo.-based solution provider FishNet Security.

  By Kevin McLaughlin, CRN
  Jun 19, 2006
  URL:http://www.ddj.com/dept/security/189500728

  Vulnerabilities in Cisco's Call Manager software could open the door  
  for hackers to reconfigure VoIP settings and gain access to  
  individual users' account information, according to researchers at  
  Kansas City, Mo.-based solution provider FishNet Security.

  In a report issued Monday, Jake Reynolds, senior security engineer at  
  FishNet, said the vulnerability affects versions 3.1 and higher of  
  Call Manager, which handles call routing and call signaling functions  
  in Cisco VoIP systems. A lack of input validation and output encoding  
  in the Web administration interface for Call Manager could allow  
  hackers to execute cross-site scripting attacks, Reynolds wrote.

  Cross site scripting attacks usually involve tricking users with  
  access privileges into clicking on a URL in an email or Web page.

  In the Call Manager scenario, attackers would send a request to the  
  Call Manager Web interface that causes malicious JavaScript to be  
  included. If the administrator could be tricked into submitting this  
  tainted request, the malicious code would execute in the victim's Web  
  browser and potentially give attackers the ability to delete or  
  reconfigure system components and gain access to confidential user  
  information, according to the report.

  In a statement, Cisco's Product Security Incident Response Team  
  (PSRIT) recommended that users verify link destinations before  
  clicking on URLs.

  Although there are no workarounds for the issue, Cisco has fixed the  
  vulnerability and fixes will be incorporated in all supported  
  CallManager trains in versions 4.3(1), 4.2(3), 4.1(3)SR4 and 3.3(5) 
  SR3, according to the statement.

  To guard against attacks, FishNet recommends that companies limit  
  network connectivity to Call Manager wherever possible to prevent  
  hackers from discovering public Web interfaces.

  "Simple Google queries are all an attacker needs in this case to  
  obtain the target Call Manager address. There are few compelling  
  reasons one could present that would justify public access to Call  
  Manager web interfaces," according to the report.

  _______________________________________________
  cisco-voip mailing list
  cisco-voip at puck.nether.net
  https://puck.nether.net/mailman/listinfo/cisco-voip

  _______________________________________________
  cisco-voip mailing list
  cisco-voip at puck.nether.net
  https://puck.nether.net/mailman/listinfo/cisco-voip
-------------- next part --------------
An HTML attachment was scrubbed...
URL: https://puck.nether.net/pipermail/cisco-voip/attachments/20060628/bf15eb7c/attachment.html 


More information about the cisco-voip mailing list