Internet Explorer 6 and earlier, when used with the Telnet client in Services for Unix (SFU) 2.0, allows remote attackers to execute commands by spawning Telnet with a log file option on the command line and writing arbitrary code into an executable file which is later executed, aka a new variant of the Telnet Invocation vulnerability as described in CVE-2001-0150.
References
Link | Resource |
---|---|
http://www.ciac.org/ciac/bulletins/m-024.shtml | Broken Link |
http://www.kb.cert.org/vuls/id/952611 | Third Party Advisory US Government Resource |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-051 | Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/7260 | Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2002-03-09T05:00:00
Updated: 2002-03-01T10:00:00
Reserved: 2001-08-15T00:00:00
Link: CVE-2001-0667
JSON object: View
NVD Information
Status : Analyzed
Published: 2001-10-30T05:00:00.000
Modified: 2024-02-13T17:56:20.760
Link: CVE-2001-0667
JSON object: View
Redhat Information
No data.
CWE