Vulnerabilities > CVE-2004-1541 - Unspecified vulnerability in VAN Dyke Technologies Securecrt
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN van-dyke-technologies
nessus
Summary
SecureCRT 4.0, 4.1, and possibly other versions, allows remote attackers to execute arbitrary commands via a telnet:// URL that uses the /F option to specify a configuration file on a samba share.
Vulnerable Configurations
Nessus
NASL family | Windows |
NASL id | SECURECRT_COMMAND_EXECUTION.NASL |
description | The remote host is using a vulnerable version of SecureCRT, a SSH/Telnet client built for Microsoft Windows operation systems. It has been reported that SecureCRT does not safely check the protocol handler. As a result, an attacker may be able to exploit it by setting up a malicious SMB share. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 15820 |
published | 2004-11-23 |
reporter | This script is Copyright (C) 2004-2018 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/15820 |
title | SecureCRT telnet URI Arbitrary Configuration Folder Remote Command Execution |
code |
|
References
- http://marc.info/?l=bugtraq&m=110129164332226&w=2
- http://marc.info/?l=bugtraq&m=110129164332226&w=2
- http://secunia.com/advisories/13275/
- http://secunia.com/advisories/13275/
- http://www.securityfocus.com/bid/11731
- http://www.securityfocus.com/bid/11731
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18201
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18201