MS09-042: Vulnerability in Telnet Could Allow Remote Code Execution (960859)

high Nessus Plugin ID 40561

Synopsis

Arbitrary code can be executed on the remote host through the remote Telnet client.

Description

The remote Telnet client does not correctly opt in to NTLM credential- reflection protections, which ensure that a user's credentials are not reflected back and used against the user.

If a remote attacker can trick a user on the host into connecting to a malicious server with an affected version of the Telnet client, he can leverage this issue to gain the rights of that user and do anything that he has privileges to do.

Solution

Microsoft has released a set of patches for Windows 2000, XP, 2003, Vista and 2008.

See Also

https://www.nessus.org/u?974a963b

Plugin Details

Severity: High

ID: 40561

File Name: smb_nt_ms09-042.nasl

Version: 1.22

Type: local

Agent: windows

Published: 8/11/2009

Updated: 8/5/2020

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2009-1930

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/11/2009

Vulnerability Publication Date: 8/11/2009

Exploitable With

Core Impact

Reference Information

CVE: CVE-2009-1930

BID: 35993

CWE: 255

IAVB: 2009-B-0037-S

MSFT: MS09-042

MSKB: 960859