Executive Summary
Summary | |
---|---|
Title | Vulnerability in Telnet Could Allow Remote Code Execution (960859) |
Informations | |||
---|---|---|---|
Name | MS09-042 | First vendor Publication | 2009-08-11 |
Vendor | Microsoft | Last vendor Modification | 2009-08-12 |
Severity (Vendor) | Important | Revision | 1.1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Revision Note: Bulletin published.Summary: This security update resolves a publicly disclosed vulnerability in the Microsoft Telnet service. The vulnerability could allow an attacker to obtain credentials and then use them to log back into affected systems. The attacker would then acquire user rights on a system identical to the user rights of the logged-on user. This scenario could ultimately result in remote code execution on affected systems. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. |
Original Source
Url : http://www.microsoft.com/technet/security/bulletin/MS09-042.mspx |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-255 | Credentials Management |
OVAL Definitions
CPE : Common Platform Enumeration
SAINT Exploits
Description | Link |
---|---|
Windows Telnet credential reflection | More info here |
OpenVAS Exploits
Date | Description |
---|---|
2009-08-12 | Name : Telnet NTLM Credential Reflection Authentication Bypass Vulnerability (960859) File : nvt/secpod_ms09-042.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
56904 | Microsoft Windows Telnet NTLM Credential Reflection Remote Access |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2009-08-13 | IAVM : 2009-B-0037 - Microsoft Telnet Remote Code Execution Vulnerability Severity : Category II - VMSKEY : V0019879 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | possible SMB replay attempt - overlapping encryption keys detected RuleID : 17723 - Revision : 12 - Type : OS-WINDOWS |
2014-01-10 | Possible Microsoft telnet NTLM reflection attempt RuleID : 17627 - Revision : 3 - Type : POLICY |
2014-01-10 | Telnet-based NTLM replay attack attempt RuleID : 15847 - Revision : 14 - Type : OS-WINDOWS |
2014-01-10 | SMB replay attempt via NTLMSSP - overlapping encryption keys detected RuleID : 15453 - Revision : 16 - Type : OS-WINDOWS |
2014-01-10 | Web-based NTLM replay attack attempt RuleID : 15124 - Revision : 17 - Type : OS-WINDOWS |
2014-01-10 | possible SMB replay attempt - overlapping encryption keys detected RuleID : 15009 - Revision : 22 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-08-11 | Name : Arbitrary code can be executed on the remote host through the remote Telnet c... File : smb_nt_ms09-042.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:46:18 |
|
2014-01-19 21:30:21 |
|
2013-11-11 12:41:12 |
|