First published: Fri Dec 31 2004(Updated: )
SecureCRT 4.0, 4.1, and possibly other versions, allows remote attackers to execute arbitrary commands via a telnet:// URL that uses the /F option to specify a configuration file on a samba share.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SecureCRT | =4.0.1 | |
SecureCRT | =4.0.2 | |
SecureCRT | =4.0.3 | |
SecureCRT | =4.0.4 | |
SecureCRT | =4.0.5 | |
SecureCRT | =4.1 | |
SecureCRT | =4.1.1 | |
SecureCRT | =4.1.2 | |
SecureCRT | =4.1.3 | |
SecureCRT | =4.1.4 | |
SecureCRT | =4.1.5 | |
SecureCRT | =4.1.6 | |
SecureCRT | =4.1.7 | |
SecureCRT | =4.1.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1541 is classified as a critical vulnerability due to the potential for remote command execution.
To mitigate CVE-2004-1541, you should upgrade SecureCRT to a version that is not affected by this vulnerability.
Affected versions include SecureCRT 4.0.1 through 4.1.8, with all versions in between also vulnerable.
Yes, CVE-2004-1541 can be exploited remotely using crafted telnet URLs.
Exploitation of CVE-2004-1541 can lead to the execution of arbitrary commands on the affected system.