Internet Explorer 6 and earlier, when used with the Telnet client in Services for Unix (SFU) 2.0, allows remote attackers to execute commands by spawning Telnet with a log file option on the command line and writing arbitrary code into an executable file which is later executed, aka a new variant of the Telnet Invocation vulnerability as described in CVE-2001-0150.
References
Link | Resource |
---|---|
http://www.ciac.org/ciac/bulletins/m-024.shtml | Broken Link |
http://www.kb.cert.org/vuls/id/952611 | Third Party Advisory US Government Resource |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-051 | Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/7260 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2001-10-30 05:00
Updated : 2024-02-13 17:56
NVD link : CVE-2001-0667
Mitre link : CVE-2001-0667
CVE.ORG link : CVE-2001-0667
JSON object : View
Products Affected
microsoft
- internet_explorer
CWE
CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')