Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

5/23/2007
02:23 AM
50%
50%

VoIPshield Security Suite Debuts

VoIPshield Systems a comprehensive set of VOIP security applications purpose-built to protect VOIP networks

LAS VEGAS -- VoIPshield Systems today announced the VoIPshield Security Suite, a comprehensive set of VoIP security applications purpose-built to protect VoIP networks. The products ship in appliance or software form, and are designed for use by enterprises, VoIP service providers, security integrators and consultants.

VoIP networks and devices are vulnerable to unique security threats and exploits, because of the real-time nature of the traffic. In addition, many new protocols and products make up the VoIP infrastructure, which traditional security products and approaches are not designed to protect.

The VoIPshield Security Suite includes:

  • VoIPaudit™ - VoIP vulnerability assessment (VVA) and penetration testing tool

  • VoIPguard™ - VoIP Intrusion Prevention System (VIPS)

  • VoIPscreen™ - VoIP Network Access Control (VNAC) system

  • VoIPblock™ - Anti-SPIT (Spam over IP Telephony) system

  • VoIPportal™ - VoIPshield Application Portal and Management Console

    Each application draws on VoIPshield’s proprietary database of VoIP-specific vulnerabilities and exploits, developed by VoIPshield Labs. The database is a collection of previously-undiscovered exploits and zero-day attacks on popular VoIP PBXs and phones, and is unique in the industry.

    The first entry in the suite, VoIPaudit 2.0, which has been in customer trials since last year, is now generally available. VoIPaudit scans an enterprise VoIP network, identifying where devices are vulnerable to attacks such as denial-of-service attacks, call eavesdropping, registration hijacking, toll fraud, and vishing (voice phishing). For each found vulnerability, VoIPaudit identifies procedures to remediate the security threat. VoIPaudit’s customers receive continual updates to the vulnerabilities database through VoIPaudit’s ActiveUpdateTM function, included in all VoIPshield’s security products. VoIPaudit supports products from the leading VoIP PBX and phone vendors, as well as all products using the Session Initiation Protocol (SIP).

    “We selected VoIPaudit based on the quality of the company’s research on VoIP vulnerabilities and unique understanding of VoIP-specific threats,” said Min Wang, Senior Manager, Public Services Technology Infrastructure Solutions, BearingPoint.

    VoIPshield Systems Inc.

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Sodinokibi Ransomware: Where Attackers' Money Goes
    Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
    Data Privacy Protections for the Most Vulnerable -- Children
    Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
    State of SMB Insecurity by the Numbers
    Ericka Chickowski, Contributing Writer,  10/17/2019
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    7 Threats & Disruptive Forces Changing the Face of Cybersecurity
    This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
    Flash Poll
    2019 Online Malware and Threats
    2019 Online Malware and Threats
    As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2019-17424
    PUBLISHED: 2019-10-22
    A stack-based buffer overflow in the processPrivilage() function in IOS/process-general.c in nipper-ng 0.11.10 allows remote attackers (serving firewall configuration files) to achieve Remote Code Execution or Denial Of Service via a crafted file.
    CVE-2019-16404
    PUBLISHED: 2019-10-21
    Authenticated SQL Injection in interface/forms/eye_mag/js/eye_base.php in OpenEMR through 5.0.2 allows a user to extract arbitrary data from the openemr database via a non-parameterized INSERT INTO statement, as demonstrated by the providerID parameter.
    CVE-2019-17400
    PUBLISHED: 2019-10-21
    The unoconv package before 0.9 mishandles untrusted pathnames, leading to SSRF and local file inclusion.
    CVE-2019-17498
    PUBLISHED: 2019-10-21
    In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a ...
    CVE-2019-16969
    PUBLISHED: 2019-10-21
    In FusionPBX up to 4.5.7, the file app\fifo_list\fifo_interactive.php uses an unsanitized "c" variable coming from the URL, which is reflected in HTML, leading to XSS.