First published: Tue Dec 13 2005(Updated: )
tunnelform.yaws in Nortel SSL VPN 4.2.1.6 allows remote attackers to execute arbitrary commands via a link in the a parameter, which is executed with extra privileges in a cryptographically signed Java Applet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nortel SSL VPN | <=4.2.1.6 | |
Nortel SSL VPN | =4.1.2.12 | |
Nortel SSL VPN | =4.1.2.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4197 is considered a high severity vulnerability due to its potential for remote command execution.
To fix CVE-2005-4197, upgrade your Nortel SSL VPN to a version that is not vulnerable, specifically beyond 4.2.1.6.
The affected versions for CVE-2005-4197 include Nortel SSL VPN version 4.2.1.6 and earlier, as well as versions 4.1.2.12 and 4.1.2.11.
Yes, CVE-2005-4197 can be exploited remotely by attackers through crafted links that manipulate the parameters.
Exploitation of CVE-2005-4197 can allow attackers to execute arbitrary commands with elevated privileges on the vulnerable system.