LOGIN PORTAL
Americas
Oceania
Sélectionnez la région / le pays / la langue
Communications Unifiées
Logiciel de collaboration
Contact Center
Téléphones et accessoires
Votre besoin
Votre secteur d'activité
La taille de votre entreprise
Nos services
Nos produits
Service client
Assistance aux Partenaires
Formation
Contactez nos commerciaux
Blog
À propos de Mitel
Carriere
Cas clients
Centre de ressources
Location FR: Canada (FR)
Advisory ID: 20-0009
Publish Date: 2020-07-07
Last Updated: 2020-07-07
Revision: 1.0
Point-to-Point Protocol (PPP) Daemon process which can be configured in Mitel Border Gateway is vulnerable to a buffer overflow vulnerability. By sending an unsolicited EAP packet to a vulnerable PPP client or server, an unauthenticated remote attacker could cause memory corruption in the PPP daemon process, which may allow for arbitrary code execution.
PPP Daemon is not enabled by default in MBG. Mitel partners/customers who have enabled this service should update to the latest release.
Product Name | Product Version | Security Bulletin | Last Updated |
---|---|---|---|
Mitel Border Gateway (MBG) | MBG 11.0 and earlier | 20-0009-001 | 2020-07-07 |
Mitel has issued new releases of the affected software.
PPP Daemon is not enabled by default in MBG. Mitel partners/customers who have enabled this service should update to the latest version.
Customers are advised to review the product Security Bulletin. For further information, please refer to the Knowledge Base article in OneView partner portal or contact Product Support.
CVE-2020-8597
Version | Date | Description |
---|---|---|
1.0 | 2020-07-07 | Initial version |
VERSION | DATE | DESCRIPTION |
VERSION | DATE | DESCRIPTION |
VERSION | DATE | DESCRIPTION |
VERSION | DATE | DESCRIPTION |