Updated: January 12, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: January 12, 2004 Updated: January 30, 2004
Statement Date: January 16, 2004
Unknown
Alcatel is well aware of the advisory on multiple H.323 message vulnerabilities and is investigating any impact this may have on our portfolio. The security of our customers' networks is of highest priority for Alcatel and we will communicate with further details once full assessments have been completed.
We are not aware of further vendor information regarding this vulnerability.
This statement in mirrored at http://www.uniras.gov.uk/vuls/2004/006489/h323.htm#Alcatel
Notified: January 12, 2004 Updated: January 13, 2004
Statement Date: January 13, 2004
Not Affected
Apple: Not Vulnerable. Mac OS X and Mac OS X Server do not contain the issue described in this note.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: January 12, 2004 Updated: January 13, 2004
Statement Date: January 13, 2004
Unknown
Please see the NISCC Vulnerability Advisory 006489/H323 at http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
We are not aware of further vendor information regarding this vulnerability.
Per NISCC Vulnerability Advisory 006489/H323 Rev 1.2: Avaya Inc. Avaya is aware of this advisory and is investigating. Any additional information concerning Avaya products will be posted at http://support.avaya.com/security.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: January 12, 2004 Updated: January 30, 2004
Statement Date: January 25, 2004
Affected
Check Point products are vulnerable to this issue, please add the below vendor statement: Please see http://www.checkpoint.com/techsupport/alerts/index.html
We are not aware of further vendor information regarding this vulnerability.
This statement has been updated at http://www.uniras.gov.uk/vuls/2004/006489/h323.htm#CheckPoint Check Point Check Point has released an advisory at the following URL: http://www.checkpoint.com/techsupport/alerts/h323.html
Notified: January 12, 2004 Updated: January 13, 2004
Statement Date: January 12, 2004
Affected
Please see http://www.cisco.com/warp/public/707/cisco-sa-20040113-h323.shtml
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: January 12, 2004 Updated: January 30, 2004
Statement Date: January 16, 2004
Not Affected
No Clavister products currently incorporate support for the H.323 protocol suite, and as such, are not vulnerable. We would however like to extend our thanks to the OUSPG for their work as well as for the responsible manner in which they handle their discoveries. Their detailed reports and test suites are certainly well-received.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Statement Date: January 13, 2004
Not Affected
Please see the NISCC Vulnerability Advisory 006489/H323 at http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
We are not aware of further vendor information regarding this vulnerability.
Per NISCC Vulnerability Advisory 006489/H323 Rev 1.1: Cyberguard Not vulnerable.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: January 12, 2004 Updated: January 13, 2004
Statement Date: January 12, 2004
Not Affected
We don't have an H.323 implementation and thus aren't affected by this.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: January 12, 2004 Updated: January 30, 2004
Statement Date: January 18, 2004
Not Affected
Foundry Networks is not affected by the multiple vulnerabilities in the H.323 implementations as stated in Vulnerability Note VU#749342
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: January 12, 2004 Updated: January 30, 2004
Statement Date: January 13, 2004
Unknown
Fujitsu's UXP/V o.s. is not affected by the problem inVU#749342 because it does not support H323.
We are not aware of further vendor information regarding this vulnerability.
Please also see the NISCC Vulnerability Advisory 006489/H323 at http://www.uniras.gov.uk/vuls/2004/006489/h323.htm and http://www.uniras.gov.uk/vuls/2004/006489/h323.htm#Fujitsu Per NISCC Vulnerability Advisory 006489/H323 Rev 1.1: Fujitsu Interstage, SystemWalker, SymfoWARE and TeamWARE family products are not affected by H.323 protocol. Other products are under investigation.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: January 12, 2004 Updated: April 05, 2004
Statement Date: January 13, 2004
Affected
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 HP SECURITY BULLETIN HPSBGN01004 REVISION: 0 SSRT3614 - HP OpenCall Multiservice Controller (OCMC) DoS (Denial of Service) NOTICE: There are no restrictions for distribution of this Bulletin provided that it remains complete and intact. The information in this Security bulletin should be acted upon as soon as possible. INITIAL RELEASE: 25 March 2004 POTENTIAL SECURITY IMPACT: Remote Denial of Service (DoS) SOURCE: HEWLETT-PACKARD COMPANY HP Software Security Response Team REFERENCES: CERT CA-2004-01, CISCO Advisory 47843 VULNERABILITY SUMMARY: A potential security vulnerability has been identified in the HP OpenCall MultiService Controller (OCMC) H.323 stack that may allow a remote user to create a Denial of Service (DoS). SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. All versions HP OCMC v1.2 and HP OCMC v1.1 for HP-UX 11.0 BACKGROUND: The HP Software Security Response team has contacted the source and various other vendors and is not aware of any malicious exploitation of any of the vulnerabilities described in this bulletin. A test suite developed by the U.K. National Infrastructure Security Co-ordination Centre (NISCC) and the University of Oulu Security Programming Group (OUSPG) has exposed vulnerabilities in several implementations of the H.323 protocol. The potential vulnerabilities may be exploited to produce a denial of service (DoS) attack. Such an attack may cause an affected product to failover or crash and failover. Due to its robust design OCMC will recover from most attack scenarios. In the event that OCMC does not recover, the attack can be stopped by blocking the offending IP address. Attacks may also be blocked by creating an access list to restrict TCP port 1720 traffic to known, trusted IP addresses. RESOLUTION: HP will be providing patches to the impacted versions of OCMC: OCMC v1.2 released January 2004 OCMC v1.1 patch 46 OCMC v1.1 patch 37 This bulletin will be revised as the patches become available and patches will be available from the normal HP Services support channel. Please write to security-alert@hp.com to request a PGP signed version of this bulletin. BULLETIN REVISION HISTORY: N/A * The software product category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number: GN=General, MA=Management Agents, MI=Misc. 3rd party, MP=HP-MPE/iX, NS=HP NonStop Servers, OV=HP OpenVMS, PI=HP Printing & Imaging, ST=HP Storage, TU=HP Tru64 UNIX, TL=Trusted Linux, UX=HP-UX, VV=VirtualVault SUPPORT: For further information, contact HP Services support channel. SUBSCRIBE: To initiate a subscription to receive future HP Security Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php +?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driver +ITRC&topiccode=ITRC On the web page: Driver and Support Alerts/Notifications Sign-up: Product Selection Under Step1: your products 1. Select product category: - a minimum of servers must be selected. 2. Select product family or search: - a minimum of one product must be selected. 3. Add a product: - a minimum of one product must be added. In Step 2: your operating system(s) - check ALL operating systems for which alerts are required. Complete the form and Save. To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page Subscriber's choice for Business: sign-in. On the Web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections. Note: In addition to the individual alerts/notifications for the selected operating systems/products, subscribers will automatically receive one copy of alerts for non-operating system categories (i.e., a subscriber who signs up for all six operating system alerts will only receive one copy of all the non-operating system alerts). REPORT: To report a potential security vulnerability with any HP supported product, send email to: security-alert@hp.com Please encrypt any exploit information using the security-alert PGP key, available from your local key server, or by sending a message with a -subject- (not body) of 'get key' (no quotes) to security-alert@hp.com. System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. "HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement." (c) Copyright 2004 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: PGP 8.0 iQA/AwUBQGODguAfOvwtKn1ZEQKPOwCgwM8MHxb77zJ2KF2Lt+njDsQP8o4AoOSF aJmHSec0C1WcBO4DilLHgf2r =k72z -----END PGP SIGNATURE-----
We are not aware of further vendor information regarding this vulnerability.
Please also see NISCC Vulnerability Advisory 006489/H323 at http://www.uniras.gov.uk/vuls/2004/006489/h323.htm. Per NISCC Vulnerability Advisory 006489/H323 Rev 1.1: Hewlett-Packard At the time of writing this document, HP is currently investigating the potential impact to HP's released Operating System software products. As further information becomes available HP will provide notice of the availability of any necessary patches through standard security bulletin announcements and be available from your normal HP Services support channel. To report potential security vulnerabilities in HP software, send an E-mail message to: security-alert@hp.com.
Notified: January 12, 2004 Updated: January 13, 2004
Statement Date: January 13, 2004
Not Affected
Please see the NISCC Vulnerability Advisory 006489/H323 at http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
We are not aware of further vendor information regarding this vulnerability.
Per NISCC Vulnerability Advisory 006489/H323 Rev 1.1: Hitachi Hitachi products are not affected by this issue.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: January 12, 2004 Updated: February 27, 2004
Affected
The following Intel(r) products are vulnerable to National Infrastructure Security Co-Ordination Centre (NISCC) Vulnerability
Advisory 006489/H323: Intel(r) NetStructure(tm) DMIP IP Boards
Intel(r) NetStructure(tm) IPT IP Boards
Intel(r) NetStructure(tm) Host Media Processing Software
Intel(r) NetStructure(tm) PBX-IP Media Gateway Patches for Intel NetStructure DMIP IP Boards and Intel NetStructure IPT IP Boards will be available in the following system releases: Intel(r) Dialogic(r) System Release 5.1.1 Feature Pack 2 for Windows*
Intel(r) Dialogic(r) System Release 6.0 CompactPCI* Feature Pack 1 for Windows
Intel(r) Dialogic(r) System Release 5.1.1 Feature Pack 2 for Linux* A patch for Intel NetStructure Host Media Processing Software will be available in a service release of Version 1.1 Feature Pack 1 for the Windows operating system. A patch for Intel NetStructure PBX-IP Media Gateway will be available in a service release of Version 4.0 firmware. Contact your Intel representative or authorized distributor for more information, or visit
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: January 12, 2004 Updated: January 13, 2004
Statement Date: January 13, 2004
Unknown
Please see the NISCC Vulnerability Advisory 006489/H323 at http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
We are not aware of further vendor information regarding this vulnerability.
Per NISCC Vulnerability Advisory 006489/H323 Rev 1.1: Lucent Lucent Technologies is aware of this vulnerability advisory and is investigating any potential impact to its product portfolio. As further information becomes available, Lucent will provide information directly to its customers, if appropriate.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: January 12, 2004 Updated: January 13, 2004
Affected
Please see http://www.microsoft.com/technet/security/bulletin/MS04-001.asp
We are not aware of further vendor information regarding this vulnerability.
Updated: February 10, 2004
Statement Date: January 16, 2004
Unknown
Not vulnerable, with the possible exception of the 5700 Voice First videoconferencing solution and associated video endpoints. Those video products are still under investigation. Mitel Networks Security Advisory MNSA-2004-001 has been issued and distributed to Mitel resellers to address these concerns. Please report any security concerns with Mitel Networks products to "security@mitel.com".
We are not aware of further vendor information regarding this vulnerability.
This statement has been mirrored at http://www.uniras.gov.uk/vuls/2004/006489/h323.htm#Mitel An additional copy of the Mitel Networks advisory is available here Mitel Networks Security Advisory MNSA-2004-001: Vulnerability Reports in H.323 Implementations Synopsis: Interim Statement About Vulnerability Reports in H.323 Implementations Advisory: MNSA-2004-001 Release Date: 2004-01-16 Last Revised: 2004-01-16 Severity: Important Impact: See below Affected Products: See below 1. SUMMARY On Tuesday, January 13th, advisories were issued by the UK National Infrastructure Security Co-Ordination Centre and the CERT Coordination Center about potential vulnerabilities in multiple implementations of the H.323 protocol used for some Voice-over-IP and videoconferencing products. Exploitation of these vulnerabilities could potentially result in a denial-of- service attack or remote code execution. At the current time Mitel Networks has determined that all of its VoIP products are NOT vulnerable as they do not make use of the H.323 protocol. However, we are still investigating whether or not a potential vulnerability exists with the following videoconferencing products: * 5700 Voice First Solution * 5750 Desktop Video Appliance * 5760 Videoconference Appliance This advisory will be updated when the results of that investigation are complete. 2. RECOMMENDATION Until the investigation can be completed Mitel Networks recommends that administrators of sites with the 5700 Voice First Solution follow the workaround suggested in the CERT advisory of applying network filters to block access to H.323 services at network borders to minimize any potential denial-of-service attacks originating outside your network. Please see the CERT advisory (URL below) for more information. 3. DESCRIPTION No vulnerability has yet been identified. If a vulnerability is found, the description will appear here. 4. AFFECTED PRODUCTS As noted above, the only Mitel Networks products still under investigation are: * 5700 Voice First Solution * 5750 Desktop Video Appliance * 5760 Videoconference Appliance It is important to note that no vulnerability has yet been found in these products and they are still under active investigation. 5. REFERENCES For more information about this potential vulnerability, see: http://www.uniras.gov.uk/vuls/2004/006489/h323.htm http://www.cert.org/advisories/CA-2004-01.html 6. REVISION HISTORY V1.0 - 16 January 2004 - Initial interim statement 7. CONTACT INFORMATION For questions relating to Mitel Networks products, please contact the Mitel Networks Product Support organization appropriate for your geographic region. If you believe you have found a security issue with a Mitel Networks product, please e-mail: security@mitel.com Mitel Networks Product Security Team PGP Key ID: 000492A6 Fingerprint: 1AF0 1058 6DD8 6A18 4032 84B7 4223 5A3B 0004 92A6 Copyright 2004 Mitel Networks Corporation
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: January 12, 2004 Updated: January 13, 2004
Statement Date: January 12, 2004
Not Affected
NetBSD does not ship any H.323 implementations as part of the Operating System. There are a number of third-party implementations available in the pkgsrc system. As these products are found to be vulnerable, or updated, the packages will be updated accordingly. The audit-packages mechanism can be used to check for known-vulnerable package versions.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: January 12, 2004 Updated: January 30, 2004
Statement Date: January 20, 2004
Not Affected
Not Vulnerable
We are not aware of further vendor information regarding this vulnerability.
This statement has also been registered at http://www.uniras.gov.uk/vuls/2004/006489/h323.htm#NetScreen
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: January 12, 2004 Updated: January 13, 2004
Statement Date: January 13, 2004
Affected
The following Nortel Networks Generally Available products and
solutions are potentially affected by the vulnerabilities identified
in NISCC Vulnerability Advisory 006489/H323 and CERT VU#749342: Business Communications Manager (BCM) (all versions) is potentially
affected; more information is available in Product Advisory Alert No. PAA 2003-0392-Global. Succession 1000 IP Trunk and IP Peer Networking, and 802.11 Wireless
IP Gateway are potentially affected; more information is available in
Product Advisory Alert No. PAA-2003-0465-Global. For more information please contact North America: 1-800-4NORTEL or 1-800-466-7835
Europe, Middle East and Africa: 00800 8008 9009, or +44 (0) 870 907
9009 Contacts for other regions are available at
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Statement Date: January 13, 2004
Not Affected
Please see the NISCC Vulnerability Advisory 006489/H323 at http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
We are not aware of further vendor information regarding this vulnerability.
Per NISCC Vulnerability Advisory 006489/H323 Rev 1.1: Objective Systems, Inc. Not vulnerable.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: July 29, 2009
Statement Date: January 20, 2004
Affected
Polycom is currently investigating the potential impact to H.323 based products for CERT Advisory CA-2004-01. Specific product information will be provided at the Polycom Security Center.
The vendor has not provided us with any further information regarding this vulnerability.
Please review the Security Headlines posted at the Polycom Security Center.
Updated: January 13, 2004
Statement Date: January 13, 2004
Affected
Please see the NISCC Vulnerability Advisory 006489/H323 at http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
We are not aware of further vendor information regarding this vulnerability.
Per NISCC Vulnerability Advisory 006489/H323 Rev 1.1: RADVISION The viaIP product line has been made invulnerable to the H.323 vulnerability test over the course of 2003. All the currently shipping versions of the product line elements (including the MCU, GW and ECS products) are immune to the test. The respective version numbers are: MCU version 3.2 and above GW version 2.01 and above ECS version 3.2.2.2 and above For more information please contact RADVISION customer support. Information about how to contact customer support can be found at: http://www.radvision.com/NBU/Customer+Support.htm.
Notified: January 12, 2004 Updated: January 13, 2004
Statement Date: January 13, 2004
Not Affected
Please see the NISCC Vulnerability Advisory 006489/H323 at http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
We are not aware of further vendor information regarding this vulnerability.
Per NISCC Vulnerability Advisory 006489/H323 Rev 1.1: Red Hat Not vulnerable.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: January 12, 2004 Updated: January 30, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: January 12, 2004 Updated: January 14, 2004
Not Affected
Sun SNMP does not provide support for H.323, so we are not vulnerable. And so far we have not found any bundled products that are affected by this vulnerability. We are also actively investigating our unbundled products to see if they are affected. Updates will be provided to this statement as they become available.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: January 12, 2004 Updated: January 13, 2004
Statement Date: January 13, 2004
Not Affected
Please see the NISCC Vulnerability Advisory 006489/H323 at http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
We are not aware of further vendor information regarding this vulnerability.
Per NISCC Vulnerability Advisory 006489/H323 Rev 1.1: Symantec Not vulnerable.
Updated: January 13, 2004
Statement Date: January 13, 2004
Affected
Please see the NISCC Vulnerability Advisory 006489/H323 at http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
We are not aware of further vendor information regarding this vulnerability.
Per NISCC Vulnerability Advisory 006489/H323 Rev 1.1: Tandberg Some malformed H323 signalling can result in denial-of-service (DOS) for TANDBERG videoconferencing endpoints. The endpoints will appear to hang for a while, then restart automatically, returning to normal service. There are no known issues which involve compromising of audio or video in an encrypted conference, or other loss of sensitive data. We expect to have product update(s) resolving these known issues in Q2-2004. For further information on this issue contact: security@tandberg.net
Updated: January 13, 2004
Statement Date: January 13, 2004
Not Affected
Please see the NISCC Vulnerability Advisory 006489/H323 at http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
We are not aware of further vendor information regarding this vulnerability.
Per NISCC Vulnerability Advisory 006489/H323 Rev 1.2: Tumbleweed Not vulnerable.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Statement Date: January 13, 2004
Not Affected
Please see the NISCC Vulnerability Advisory 006489/H323 at http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
We are not aware of further vendor information regarding this vulnerability.
Per NISCC Vulnerability Advisory 006489/H323 Rev 1.1: uniGone Not vulnerable.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: January 12, 2004 Updated: January 15, 2004
Statement Date: January 15, 2004
Not Affected
A response to this vulnerability is available from our Security Information site: http://www.xerox.com/security.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments about this response to this vulnerability at this time. Cache of Xerox response at http://www.xerox.com/security: Thu Jan 15 16:00:47 EST 2004
Updated: January 13, 2004
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
The CERT/CC has no additional comments at this time.