<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=iso-8859-1">
<META content="MSHTML 6.00.2900.2912" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT size=2>There's a CallManager 4.3(1)?
WAH?????????????????????</FONT></DIV>
<DIV><FONT size=2></FONT> </DIV>
<DIV>--------------------------------------------------------------------------------<BR>Lelio
Fulgenzi, B.A.<BR>Senior Analyst (CCS) * University of Guelph * Guelph, Ontario
N1G 2W1<BR>(519) 824-4120 x56354 (519) 767-1060 FAX
(JNHN)<BR>^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
<BR>"I can eat fifty eggs." "Nobody can eat fifty eggs."</DIV>
<BLOCKQUOTE
style="PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
<DIV style="FONT: 10pt arial">----- Original Message ----- </DIV>
<DIV
style="BACKGROUND: #e4e4e4; FONT: 10pt arial; font-color: black"><B>From:</B>
<A title=rratliff@cisco.com href="mailto:rratliff@cisco.com">Ryan Ratliff</A>
</DIV>
<DIV style="FONT: 10pt arial"><B>To:</B> <A title=rleetun@co.boulder.co.us
href="mailto:rleetun@co.boulder.co.us">Leetun, Rob</A> </DIV>
<DIV style="FONT: 10pt arial"><B>Cc:</B> <A title=cisco-voip@puck.nether.net
href="mailto:cisco-voip@puck.nether.net">ciscovoip</A> </DIV>
<DIV style="FONT: 10pt arial"><B>Sent:</B> Wednesday, June 28, 2006 9:36
AM</DIV>
<DIV style="FONT: 10pt arial"><B>Subject:</B> Re: [cisco-voip] Have you seen
this article?</DIV>
<DIV><BR></DIV><A
href="http://www.cisco.com/en/US/products/sw/voicesw/ps556/">http://www.cisco.com/en/US/products/sw/voicesw/ps556/</A>
<BR>tsd_products_security_response09186a00806c0846.html<BR><BR>-Ryan<BR><BR>On
Jun 28, 2006, at 9:17 AM, Leetun, Rob wrote:<BR><BR> Cisco Call Manager
Flaw Could Invite Hackers<BR><BR>Vulnerabilities in Cisco's Call Manager
software could open the door <BR>for hackers to reconfigure VoIP
settings and gain access to <BR>individual users' account information,
according to researchers at <BR>Kansas City, Mo.-based solution provider
FishNet Security.<BR><BR>By Kevin McLaughlin, CRN<BR>Jun 19, 2006<BR><A
href="http://www.ddj.com/dept/security/189500728">URL:http://www.ddj.com/dept/security/189500728</A><BR><BR>Vulnerabilities
in Cisco's Call Manager software could open the door <BR>for hackers to
reconfigure VoIP settings and gain access to <BR>individual users'
account information, according to researchers at <BR>Kansas City,
Mo.-based solution provider FishNet Security.<BR><BR>In a report issued
Monday, Jake Reynolds, senior security engineer at <BR>FishNet, said the
vulnerability affects versions 3.1 and higher of <BR>Call Manager, which
handles call routing and call signaling functions <BR>in Cisco VoIP
systems. A lack of input validation and output encoding <BR>in the Web
administration interface for Call Manager could allow <BR>hackers to
execute cross-site scripting attacks, Reynolds wrote.<BR><BR>Cross site
scripting attacks usually involve tricking users with <BR>access
privileges into clicking on a URL in an email or Web page.<BR><BR>In the Call
Manager scenario, attackers would send a request to the <BR>Call Manager
Web interface that causes malicious JavaScript to be <BR>included. If
the administrator could be tricked into submitting this <BR>tainted
request, the malicious code would execute in the victim's Web
<BR>browser and potentially give attackers the ability to delete or
<BR>reconfigure system components and gain access to confidential user
<BR>information, according to the report.<BR><BR>In a statement, Cisco's
Product Security Incident Response Team <BR>(PSRIT) recommended that
users verify link destinations before <BR>clicking on
URLs.<BR><BR>Although there are no workarounds for the issue, Cisco has fixed
the <BR>vulnerability and fixes will be incorporated in all
supported <BR>CallManager trains in versions 4.3(1), 4.2(3), 4.1(3)SR4
and 3.3(5) <BR>SR3, according to the statement.<BR><BR>To guard against
attacks, FishNet recommends that companies limit <BR>network
connectivity to Call Manager wherever possible to prevent <BR>hackers
from discovering public Web interfaces.<BR><BR>"Simple Google queries are all
an attacker needs in this case to <BR>obtain the target Call Manager
address. There are few compelling <BR>reasons one could present that
would justify public access to Call <BR>Manager web interfaces,"
according to the
report.<BR><BR>_______________________________________________<BR>cisco-voip
mailing list<BR><A
href="mailto:cisco-voip@puck.nether.net">cisco-voip@puck.nether.net</A><BR><A
href="https://puck.nether.net/mailman/listinfo/cisco-voip">https://puck.nether.net/mailman/listinfo/cisco-voip</A><BR><BR>_______________________________________________<BR>cisco-voip
mailing list<BR><A
href="mailto:cisco-voip@puck.nether.net">cisco-voip@puck.nether.net</A><BR><A
href="https://puck.nether.net/mailman/listinfo/cisco-voip">https://puck.nether.net/mailman/listinfo/cisco-voip</A><BR></BLOCKQUOTE></BODY></HTML>