Short Name |
SMB:MS-TELNET-INSECURE-LOADING |
---|---|
Severity |
Medium |
Recommended |
No |
Recommended Action |
Drop |
Category |
SMB |
Keywords |
Microsoft Telnet Protocol Handler Insecure Loading |
Release Date |
2011/08/17 |
Update Number |
1975 |
Supported Platforms |
idp-4.1.110110609+, isg-3.4.139899+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known remote code execution vulnerability in the Microsoft telnet.exe service. It is due to a design weakness in the way telnet protocol handler is implemented. Remote attackers can exploit this by enticing target users to download a malicious exe file from an SMB share. A successful attack can result in loading the attacker-controlled library and execution of arbitrary code with the privileges of the logged-in user. If a user is logged-on with administrative user rights, an attacker can take complete control of the affected system.
Microsoft Internet Explorer is prone to a vulnerability that lets attackers execute arbitrary remote code. An attacker can exploit this issue by enticing a legitimate user to use a vulnerable version of the application to access an HTML file from a network share location that contains a specially crafted executable file.