Internet Explorer 6 and earlier, when used with the Telnet client in Services for Unix (SFU) 2.0, allows remote attackers to execute commands by spawning Telnet with a log file option on the command line and writing arbitrary code into an executable file which is later executed, aka a new variant of the Telnet Invocation vulnerability as described in CVE-2001-0150.
The product constructs a string for a command to be executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string.
Link | Tags |
---|---|
http://www.kb.cert.org/vuls/id/952611 | third party advisory us government resource |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-051 | patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/7260 | third party advisory vdb entry |
http://www.ciac.org/ciac/bulletins/m-024.shtml | third party advisory broken link government resource |