[NEWS] ZyXel P2000W VoIP Information Disclosure and DoS



The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html

- - - - - - - - -



ZyXel P2000W VoIP Information Disclosure and DoS
------------------------------------------------------------------------


SUMMARY


<http://www.zyxel.com/product/model.php?indexcate=1122437334&indexFlagvalue=1075687935> ZyXel P2000W version 2 is "a mobile VoIP phone".

Undocumented open port in ZyXel P2000W version 2 VoIP allows attackers to
gain information and DoS the VoIP phone.

DETAILS

Vulnerable Systems:
* ZyXel P2000W version 2 Firmware version: WV.00.02

The Zyxel P2000W Version 2 VoIP wireless phone has an undocumented port,
UDP/9090, that provides an unauthenticated attacker information about the
phone, specifically the phone's MAC address and software version.

An attacker can use this vulnerability to easily identity the phone and
software version. Also, the undocumented open port provide an avenue for
DoS.


ADDITIONAL INFORMATION

The information has been provided by <mailto:shawnmer@xxxxxxxxx> Shawn
Merdinger.



========================================


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx


====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.



Relevant Pages

  • [NEWS] UTStarcoms iAN-02EX Remote Access Vulnerability
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... next-generation, standards-based Voice-over-IP (VoIP) communications ... configuration leaves the ATA vulnerable to unauthorized remote access. ... This configuration makes the ATA's WAN port ...
    (Securiteam)
  • [UNIX] phpSysInfo Multiple Vulnerabilities (HTTP_ACCEPT_LANGUAGE, sensor_program, VERSION, charset)
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Multiple vulnerabilities have been discovered in phpSysInfo allowing ... the attacker to additionally inject the $lng parameter. ... $sensor_program can *still* be used to inject active ...
    (Securiteam)
  • [NT] Directory Traversal In CProxy
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... directory traversal attack and thus gain access to arbitrary files located ... on the CProxy Server system. ... filtering allows a remote attacker to gain attack to arbitrary files on ...
    (Securiteam)
  • [UNIX] KDE URI handler vulnerabilities
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... A bug in KDE can be used by an attacker to create or truncate arbitrary ... The KDE URI handler does not perform adequate filtering ...
    (Securiteam)
  • [NT] PicoWebServer Unicode Stack Overflow
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... A buffer overflow vulnerability has been discovered in PicoWebServer, ... exploiting this vulnerability allows a remote attacker to run arbitrary ... an attacker can trigger a stack overflow and cause the ...
    (Securiteam)