Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2001-0347 | First vendor Publication | 2001-07-21 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Information disclosure vulnerability in Microsoft Windows 2000 telnet service allows remote attackers to determine the existence of user accounts such as Guest, or log in to the server without specifying the domain name, via a malformed userid. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0347 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
5686 | Microsoft Windows Telnet Service Account Information Disclosure The Microsoft Windows 2000 Telnet service contains a flaw that may allow a malicious user to access accounts which should not be accessible. The issue is triggered when a special set of characters is used as a prefix to the username supplied (in place of a domain name). This flaw causes the service to search the domain, and any trusted domains, for the specified user. It is possible that the flaw may allow an attacker to authenticate from normally inaccessible common domain accounts such as the guest account. This flaw may result in an attacker gaining telnet access via an exposed account as described above. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2003-03-12 | Name : The remote host is vulnerable to privilege escalation. File : smb_nt_ms02-001.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:24:20 |
|
2024-11-28 12:04:25 |
|
2021-05-04 12:01:20 |
|
2021-04-22 01:01:32 |
|
2020-05-23 00:14:36 |
|
2018-10-13 00:22:24 |
|
2017-10-10 09:23:20 |
|
2016-06-28 14:55:27 |
|
2013-05-11 12:03:52 |
|