CERTA-2002-AVI-025
Vulnerability from certfr_avis - Published: - Updated:
Un utilisateur distant mal intentionné peut, en provoquant un débordement de mémoire dans le serveur Telnet, exécuter du code arbitraire ou entraîner un déni de service.
Description
Une mauvaise gestion de la mémoire du serveur Telnet peut permettre d'exécuter à distance, par le biais de requêtes judicieusement composées, du code arbitraire (avec les droits system sous Windows 2000) ou entraîner un déni de service.
Sous Windows 2000, le serveur Telnet est installé par défaut mais non lancé.
Solution
Télécharger le correctif sur le site Microsoft :
-
Windows 2000 :
http://www.microsoft.com/windows2000/downloads/security/q307298/default.asp -
Interix 2.2 :
http://www.microsoft.com/downloads/release.asp?ReleaseID=35969
Impacted products
References
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Serveur Telnet sous Microsoft Windows 2000 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Service Telnet sous Microsoft Interix 2.2.",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nUne mauvaise gestion de la m\u00e9moire du serveur Telnet peut permettre\nd\u0027ex\u00e9cuter \u00e0 distance, par le biais de requ\u00eates judicieusement\ncompos\u00e9es, du code arbitraire (avec les droits system sous Windows 2000)\nou entra\u00eener un d\u00e9ni de service.\n\nSous Windows 2000, le serveur Telnet est install\u00e9 par d\u00e9faut mais non\nlanc\u00e9. \n \n\n## Solution\n\nT\u00e9l\u00e9charger le correctif sur le site Microsoft :\n\n- Windows 2000 :\n\n http://www.microsoft.com/windows2000/downloads/security/q307298/default.asp\n\n- Interix 2.2 :\n\n http://www.microsoft.com/downloads/release.asp?ReleaseID=35969\n",
"cves": [],
"links": [
{
"title": "Bulletin Microsoft :",
"url": "http://www.microsoft.com/technet/security/bulletin/MS02-004.asp"
}
],
"reference": "CERTA-2002-AVI-025",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2002-02-08T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
}
],
"summary": "Un utilisateur distant mal intentionn\u00e9 peut, en provoquant un\nd\u00e9bordement de m\u00e9moire dans le serveur Telnet, ex\u00e9cuter du code\narbitraire ou entra\u00eener un d\u00e9ni de service.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans le serveur Telnet Microsoft",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin Microsoft MS02-004",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…