ID

VAR-200710-0047


CVE

CVE-2007-5468


TITLE

Cisco CallManager Call or caller to any phone number at ID Vulnerabilities that are disguised

Trust: 0.8

sources: JVNDB: JVNDB-2007-002786

DESCRIPTION

Cisco CallManager 5.1.1.3000-5 does not verify the Digest authentication header URI against the Request URI in SIP messages, which allows remote attackers to use sniffed Digest authentication credentials to call arbitrary telephone numbers or spoof caller ID (aka "toll fraud and authentication forward attack"). CallManager and Openser are prone to a remote unauthorized-access vulnerability that may lead to toll fraud and caller-ID spoofing. A remote attacker can exploit this issue to initiate unauthorized phone calls and pretend to be a legitimate user. Cisco CallManager does not check that the URI provided by the user in the Digest-Authentication header matches the message's REQUEST-URI, and a malicious user could sniff the Digest-Authentication from a legitimate user and then call arbitrary extensions on behalf of that user. ---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,700 different Windows applications. Request your account, the Secunia Network Software Inspector (NSI): http://secunia.com/network_software_inspector/ ---------------------------------------------------------------------- TITLE: Cisco CallManager Authentication Header Hijacking Security Issue SECUNIA ADVISORY ID: SA27231 VERIFY ADVISORY: http://secunia.com/advisories/27231/ CRITICAL: Less critical IMPACT: Hijacking WHERE: >From local network SOFTWARE: Cisco Unified CallManager 5.x http://secunia.com/product/12535/ DESCRIPTION: A security issue has been reported in Cisco CallManager, which can be exploited by malicious people to hijack user sessions. The security issue is caused due to the improper processing of SIP messages and can be exploited to make calls from a hijacked account by requesting a URI containing a sniffed authentication header. The security issue is reported in Cisco CallManager system version 5.1.1.3000-5 and administration version 1.1.0.0-1. Other versions may also be affected. SOLUTION: Use Cisco CallManager in a trusted network environment only. PROVIDED AND/OR DISCOVERED BY: Humberto J. Abdelnur, Radu State, and Olivier Festor ORIGINAL ADVISORY: http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066581.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2007-5468 // JVNDB: JVNDB-2007-002786 // BID: 26057 // VULHUB: VHN-28830 // PACKETSTORM: 60214

AFFECTED PRODUCTS

vendor:ciscomodel:call managerscope:eqversion:5.1.1.3000

Trust: 1.6

vendor:ciscomodel:call managerscope:eqversion:5.1.1.3000-5

Trust: 0.8

vendor:opensermodel:openserscope:eqversion:1.2.2

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:5.1(1)

Trust: 0.3

vendor:ciscomodel:unified callmanagerscope:eqversion:5.1

Trust: 0.3

vendor:ciscomodel:call managerscope:eqversion:5.1

Trust: 0.3

sources: BID: 26057 // JVNDB: JVNDB-2007-002786 // CNNVD: CNNVD-200710-299 // NVD: CVE-2007-5468

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-5468
value: MEDIUM

Trust: 1.0

NVD: CVE-2007-5468
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200710-299
value: MEDIUM

Trust: 0.6

VULHUB: VHN-28830
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2007-5468
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-28830
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-28830 // JVNDB: JVNDB-2007-002786 // CNNVD: CNNVD-200710-299 // NVD: CVE-2007-5468

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-28830 // JVNDB: JVNDB-2007-002786 // NVD: CVE-2007-5468

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200710-299

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-200710-299

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-002786

PATCH

title:Top Pageurl:http://www.cisco.com/warp/public/cc/pd/nemnsw/callmn/index.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2007-002786

EXTERNAL IDS

db:NVDid:CVE-2007-5468

Trust: 2.8

db:BIDid:26057

Trust: 2.0

db:SECUNIAid:27231

Trust: 1.8

db:VUPENid:ADV-2007-3534

Trust: 1.7

db:JVNDBid:JVNDB-2007-002786

Trust: 0.8

db:FULLDISCid:20071012 CALLMANAGER AND OPESER TOLL FRAUD AND AUTHENTICATION FORWARD ATTACK

Trust: 0.6

db:FULLDISCid:20071015 CALLMANAGER AND OPESER TOLL FRAUD AND AUTHENTICATION FORWARD ATTACK

Trust: 0.6

db:XFid:37197

Trust: 0.6

db:CNNVDid:CNNVD-200710-299

Trust: 0.6

db:VULHUBid:VHN-28830

Trust: 0.1

db:PACKETSTORMid:60214

Trust: 0.1

sources: VULHUB: VHN-28830 // BID: 26057 // JVNDB: JVNDB-2007-002786 // PACKETSTORM: 60214 // CNNVD: CNNVD-200710-299 // NVD: CVE-2007-5468

REFERENCES

url:http://lists.grok.org.uk/pipermail/full-disclosure/2007-october/066581.html

Trust: 1.8

url:http://www.securityfocus.com/bid/26057

Trust: 1.7

url:http://lists.grok.org.uk/pipermail/full-disclosure/2007-october/066691.html

Trust: 1.7

url:http://lists.grok.org.uk/pipermail/full-disclosure/2007-october/066694.html

Trust: 1.7

url:http://secunia.com/advisories/27231

Trust: 1.7

url:http://www.vupen.com/english/advisories/2007/3534

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/37197

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5468

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-5468

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/37197

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2007/3534

Trust: 0.6

url:http://archives.neohapsis.com/archives/fulldisclosure/2007-10/0306.html

Trust: 0.3

url:http://www.cisco.com/warp/public/cc/pd/nemnsw/callmn/index.shtml

Trust: 0.3

url:http://www.openser.org/index.php?option=com_frontpage&itemid=1

Trust: 0.3

url:http://secunia.com/advisories/27231/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/network_software_inspector/

Trust: 0.1

url:http://secunia.com/product/12535/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-28830 // BID: 26057 // JVNDB: JVNDB-2007-002786 // PACKETSTORM: 60214 // CNNVD: CNNVD-200710-299 // NVD: CVE-2007-5468

CREDITS

Radu State※ state@loria.fr

Trust: 0.6

sources: CNNVD: CNNVD-200710-299

SOURCES

db:VULHUBid:VHN-28830
db:BIDid:26057
db:JVNDBid:JVNDB-2007-002786
db:PACKETSTORMid:60214
db:CNNVDid:CNNVD-200710-299
db:NVDid:CVE-2007-5468

LAST UPDATE DATE

2025-04-10T23:09:42.498000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-28830date:2017-07-29T00:00:00
db:BIDid:26057date:2007-10-26T20:16:00
db:JVNDBid:JVNDB-2007-002786date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200710-299date:2007-10-17T00:00:00
db:NVDid:CVE-2007-5468date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-28830date:2007-10-16T00:00:00
db:BIDid:26057date:2007-10-12T00:00:00
db:JVNDBid:JVNDB-2007-002786date:2012-06-26T00:00:00
db:PACKETSTORMid:60214date:2007-10-19T15:32:30
db:CNNVDid:CNNVD-200710-299date:2007-10-15T00:00:00
db:NVDid:CVE-2007-5468date:2007-10-16T00:17:00