Message Storage Server POP3 Denial of Service

Original Release Date: December 19, 2005
Last Revised: January 13, 2006
Number: ASA-2005-235
Risk Level: High
Advisory Version: 2.0
Advisory Status: Final

1. Overview:

The Avaya Modular Messaging Message Storage Server provides convenient access to voice, e-mail, and fax messages from phones or computers, so employees can collaborate to make faster, better decisions, and improve customer service.

A flaw was discovered in the Avaya Message Storage Server (MSS) POP3 service. This flaw could allow a remote attacker to cause a denial of service (infinite loop) via specially crafted packets. Although Avaya is not aware of active attacks that exploit this flaw, customers are recommended to apply patch number A1312pt+p to resolve this issue.

2. Mitigating Factors:

This flaw only affects systems with the POP3 service enabled. The POP3 service is disabled by default, in all versions of MSS.

3. Avaya System Products affected with POP3 Vulnerability:

Product: Affected S/W Version(s): Actions:
Avaya� Modular Messaging Message Storage Server (MSS) All versions up to and including 2.0 Service Pack 4 Install patch A1312pt+p.
Follow the instructions found at http://support.avaya.com/elmodocs2/PSN/PSN599u.pdf.

4. Recommended Actions for Message Storage Server:

Follow the instructions to install patch A1312pt+p found at:

5. Additional Information:

Additional information may also be available via the Avaya support website and through your Avaya account representative. Please contact your Avaya product support representative, or dial 1-866-242-2121, with any questions.

6. Disclaimer:

ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED "AS IS". AVAYA INC., ON BEHALF ITSELF AND ITS SUBSIDIARIES AND AFFILIATES (HEREINAFTER COLLECTIVELY REFERRED TO AS "AVAYA"), DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE AND FURTHERMORE, AVAYA MAKES NO REPRESENTATIONS OR WARRANTIES THAT THE STEPS RECOMMENDED WILL ELIMINATE SECURITY OR VIRUS THREATS TO CUSTOMERS' SYSTEMS. IN NO EVENT SHALL AVAYA BE LIABLE FOR ANY DAMAGES WHATSOEVER ARISING OUT OF OR IN CONNECTION WITH THE INFORMATION OR RECOMMENDED ACTIONS PROVIDED HEREIN, INCLUDING DIRECT, INDIRECT, CONSEQUENTIAL DAMAGES, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF AVAYA HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

THE INFORMATION PROVIDED HERE DOES NOT AFFECT THE SUPPORT AGREEMENTS IN PLACE FOR AVAYA PRODUCTS. SUPPORT FOR AVAYA PRODUCTS CONTINUES TO BE EXECUTED AS PER EXISTING AGREEMENTS WITH AVAYA.

7. Revision History:

V 1.0 - December 15, 2005 - Initial Statement issued.
V 2.0 - January 13, 2006 - Converted from pdf to html.

Send information regarding any discovered security problems with Avaya products to either the contact noted in the product's documentation or [email protected].

© 2006 Avaya Inc. All Rights Reserved. All trademarks identified by the ® or ™ are registered trademarks or trademarks, respectively, of Avaya Inc. All other trademarks are the property of their respective owners.