Endpoint Protection

 View Only
  • 1.  Tandberg VCS helppage.php Directory Traversal Vulnerability.

    Posted May 03, 2010 04:30 PM
    Hello,

    I am new to Symantec AV. My SAV is installed in a Windows 2000 server (will be migrated to 2003 or 2008 soon.)  My Retina Scanner reported the following vulnerability in one of my servers:
    Vulnerability: Tandberg VCS helppage.php Directory Traversal.
    Description:
    Tandberg Video Communication Server (VCS) contains a vulnerability in the "helppage.php" scrip.
    How To Fix:  Upgrade firmware to a fixed release.

    I searched http://ftp.tandberg.com/pub/software/vcs and found that I need to know my VCS version first.  I would like to ask you few questions:
    1) Is this vulnerability related to MS Windows or SAV?
    2) How do I find my Tandberg VCS version?
    3) What is the appropriate patch for this vulnerability?
    Thanks.
    HDVU



  • 2.  RE: Tandberg VCS helppage.php Directory Traversal Vulnerability.

    Posted May 03, 2010 04:34 PM
    I would contact Tandberg support... They know their products much more intimately than Symantec does.


  • 3.  RE: Tandberg VCS helppage.php Directory Traversal Vulnerability.

    Posted May 03, 2010 04:45 PM

    That is a vulnerability in Tandberg VCS.

    http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-4511

    As Ryan stated, please visit Tandberg for support.

    http://www.tandberg.com/support/video-conferencing-online-support.jsp