Internet Explorer 5.5 and earlier executes Telnet sessions using command line arguments that are specified by the web site, which could allow remote attackers to execute arbitrary commands if the IE client is using the Telnet client provided in Services for Unix (SFU) 2.0, which creates session transcripts.
The product constructs a string for a command to be executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string.
Link | Tags |
---|---|
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-015 | patch vendor advisory |
http://www.osvdb.org/7816 | vdb entry broken link |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6230 | third party advisory vdb entry |
http://www.securityfocus.com/bid/2463 | broken link third party advisory vdb entry |