Avaya WinPDM Multiple Buffer Overflow Vulnerabilities

Summary
The host is running Avaya WinPDM and is prone to multiple buffer overflow vulnerabilities.
Impact
Successful exploitation will allow unauthenticated attackers to cause the application to crash. Impact Level: Application
Solution
Upgrade to Avaya WinPDM 3.8.5 or later, For updates refer to http://support.avaya.com/products/
Insight
Multiple flaws are due to a boundary error in, - Unite Host Router service (UniteHostRouter.exe) when processing certain requests can be exploited to cause a stack-based buffer overflow via long string to the 'To:' field sent to UDP port 3217. - UspCsi.exe when processing certain crafted overly long string requests can be exploited to cause a heap-based buffer overflow via a specially crafted overly long string sent to UDP port 10136. - CuspSerialCsi.exe when processing certain crafted overly long string requests can be exploited to cause a heap-based buffer overflow via a specially crafted overly long string sent to UDP port 10158. - MwpCsi.exe when processing certain crafted overly long string requests can be exploited to cause a heap-based buffer overflow via a specially crafted overly long string sent to UDP port 10137. - PMServer.exe when processing certain requests can be exploited to cause a heap-based buffer overflow via a specially crafted overly long string sent to UDP port 10138.
Affected
Avaya WinPDM version 3.8.2 and prior
References