CERTA-2005-AVI-214
Vulnerability from certfr_avis - Published: 2005-06-15 - Updated: 2005-10-06
Une vulnérabilité dans le client Telnet de Microsoft permet à un utilisateur mal intentionné d'avoir accès à des informations sensibles sur le système vulnérable.
Description
Le client Telnet permet d'émuler un terminal à distance.
Une vulnérabilité dans la gestion de la commande NEW-ENVIRON permet à un
utilisateur mal intentionné, via un serveur Telnet malicieux, d'avoir
accès à des informations sensibles sur le système vulnérable.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Microsoft Windows XP Professional x64 Edition ; | ||
| Microsoft | Windows | Microsoft Windows Services pour UNIX versions 2.2, 3.0 et 3.5 sur plate-forme Microsoft Windows 2000 ; | ||
| Microsoft | Windows | Microsoft Windows Server 2003 pour Itanium et Microsoft Windows Server 2003 avec Service Pack 1 pour Itanium ; | ||
| Microsoft | Windows | Microsoft Windows Server 2003 x64 Edition ; | ||
| Microsoft | Windows | Microsoft Windows XP 64-Bit Edition Version 2003 (Itanium) ; | ||
| Microsoft | Windows | Microsoft Windows XP Service Pack 1 et Service Pack 2 ; | ||
| Microsoft | Windows | Microsoft Windows Server 2003 et Microsoft Windows Server 2003 avec Service Pack 1 ; | ||
| Microsoft | Windows | Microsoft Windows XP 64-Bit Edition Service Pack 1 (Itanium) ; |
References
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Windows XP Professional x64 Edition ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows Services pour UNIX versions 2.2, 3.0 et 3.5 sur plate-forme Microsoft Windows 2000 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows Server 2003 pour Itanium et Microsoft Windows Server 2003 avec Service Pack 1 pour Itanium ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows Server 2003 x64 Edition ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows XP 64-Bit Edition Version 2003 (Itanium) ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows XP Service Pack 1 et Service Pack 2 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows Server 2003 et Microsoft Windows Server 2003 avec Service Pack 1 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows XP 64-Bit Edition Service Pack 1 (Itanium) ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nLe client Telnet permet d\u0027\u00e9muler un terminal \u00e0 distance. \nUne vuln\u00e9rabilit\u00e9 dans la gestion de la commande NEW-ENVIRON permet \u00e0 un\nutilisateur mal intentionn\u00e9, via un serveur Telnet malicieux, d\u0027avoir\nacc\u00e8s \u00e0 des informations sensibles sur le syst\u00e8me vuln\u00e9rable.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [],
"initial_release_date": "2005-06-15T00:00:00",
"last_revision_date": "2005-10-06T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 iDEFENSE 06.14.05 du 14 juin 2005 :",
"url": "http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1205"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 iDEFENSE 06.14.05 du 14 juin 2005 :",
"url": "http://www.idefense.com/application/poi/display?id=260\u0026type=vulnerabilities"
}
],
"reference": "CERTA-2005-AVI-214",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2005-06-15T00:00:00.000000"
},
{
"description": "correction orthographique.",
"revision_date": "2005-10-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 dans le client Telnet de Microsoft permet \u00e0 un\nutilisateur mal intentionn\u00e9 d\u0027avoir acc\u00e8s \u00e0 des informations sensibles\nsur le syst\u00e8me vuln\u00e9rable.\n",
"title": "Vuln\u00e9rabilit\u00e9 du client Telnet Microsoft",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft MS05-033 du 14 juin 2005",
"url": "http://www.microsoft.com/technet/security/bulletin/MS05-033.mspx"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…