----------------------------------------------------------------------



Accurate Vulnerability Scanning
No more false positives, no more false negatives

http://secunia.com/vulnerability_scanning/



----------------------------------------------------------------------

TITLE:
Avaya CMS Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA37883

VERIFY ADVISORY:
http://secunia.com/advisories/37883/

DESCRIPTION:
Avaya has acknowledged some vulnerabilities in Avaya CMS, which can
be exploited by malicious, local users to cause a DoS (Denial of
Service) and by malicious people to cause a DoS, poison the DNS
cache, bypass certain security restrictions, disclose sensitive
information, or compromise a vulnerable system.

For more information:
SA36915
SA37032
SA37068
SA37231
SA37246
SA37249
SA37491
SA37505

SOLUTION:
The vendor recommends that local and network access to the affected
systems be restricted until an update is available.

ORIGINAL ADVISORY:
ASA-2009-478:
http://support.avaya.com/css/P8/documents/100067222

ASA-2009-520:
http://support.avaya.com/css/P8/documents/100068866

ASA-2009-511:
http://support.avaya.com/css/P8/documents/100068837

ASA-2009-512:
http://support.avaya.com/css/P8/documents/100068833

ASA-2009-527:
http://support.avaya.com/css/P8/documents/100068854

ASA-2009-533:
http://support.avaya.com/css/P8/documents/100069601

ASA-2009-556:
http://support.avaya.com/css/P8/documents/100070096

ASA-2009-569:
http://support.avaya.com/css/P8/documents/100070199

OTHER REFERENCES:
SA36915:
http://secunia.com/advisories/36915/

SA37032:
http://secunia.com/advisories/37032/

SA37068:
http://secunia.com/advisories/37068/

SA37231:
http://secunia.com/advisories/37231/

SA37246:
http://secunia.com/advisories/37246/

SA37249:
http://secunia.com/advisories/37249/

SA37491:
http://secunia.com/advisories/37491/

SA37505:
http://secunia.com/advisories/37505/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

----------------------------------------------------------------------