J-Security Center

Title: Avaya SIP Enablement Services (SES) Server Multiple Input Validation Vulnerabilities

Severity: HIGH


Avaya SIP Enablement Services (SES) allows Avaya Communication Manager to use the SIP protocol.

SES prone to multiple input-validation vulnerabilities:

1. An SQL-injection vulnerability allows authenticated attackers to execute arbitrary SQL commands by injecting valid SQL strings into an SIP REQUEST.

2. A second SQL-injection vulnerability allows authenticated attackers to inject SQL commands that will cause SES to consume excessive computer resources.

3. An authentication-bypass issue occurs because of an unspecified flaw in the authentication process. Attackers can leverage this to reuse valid credentials and gain unauthorized access. Failed attacks can cause denial-of-service conditions.

Attackers can exploit these issues to execute arbitrary SQL commands, cause denial-of-service conditions, or elevate privileges.

Affected Products:

  • Avaya SIP Enablement Services 3.0
  • Avaya SIP Enablement Services 3.1
  • Avaya SIP Enablement Services 3.1.1
  • Avaya SIP Enablement Services 4.0
  • Avaya SIP Enablement Services 5.0


Juniper Networks provides this content via a wide variety of sources and production methods. If notified of errors or omissions in the content of this page, Juniper Networks, at its discretion, will modify or remove the page or leave the content as is, depending on various factors including but not limited to the reputation and authority of the party providing the notification. Please use the contact information displayed elsewhere on this page to report any errors or omissions regarding the content on this page.