Vulnerabilities > CVE-2004-1541 - Remote Command Execution vulnerability in Van Dyke SecureCRT
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
SecureCRT 4.0, 4.1, and possibly other versions, allows remote attackers to execute arbitrary commands via a telnet:// URL that uses the /F option to specify a configuration file on a samba share.
Vulnerable Configurations
Nessus
NASL family | Windows |
NASL id | SECURECRT_COMMAND_EXECUTION.NASL |
description | The remote host is using a vulnerable version of SecureCRT, a SSH/Telnet client built for Microsoft Windows operation systems. It has been reported that SecureCRT does not safely check the protocol handler. As a result, an attacker may be able to exploit it by setting up a malicious SMB share. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 15820 |
published | 2004-11-23 |
reporter | This script is Copyright (C) 2004-2018 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/15820 |
title | SecureCRT telnet URI Arbitrary Configuration Folder Remote Command Execution |
code |
|