{"vuid":"VU#952611","idnumber":"952611","name":"Microsoft Internet Explorer (IE) calls telnet.exe with unsafe command-line arguments (\"Telnet Invocation\")","keywords":["Microsoft Internet Explorer","IE","Services for UNIX","SFU","command-line options","MS01-051"],"overview":"A telnet client can be invoked with unsafe options by arbitrary HTML (\"web\") pages when rendered by affected Microsoft Internet Explorer clients.","clean_desc":"This vulnerability is also known as the \"telnet logging\" or \"telnet invocation\" or \"Microsoft IE Telnet Client File Overwrite\" vulnerability. A similar vulnerability was first described in Microsoft Security Bulletin MS01-015. When vulnerable versions of Internet Explorer render HTML with malicious 'telnet:' tags, the telnet.exe client can be called with unsafe arguments. A telnet option may be specified which directs transcripts or logs of a telnet session to overwrite or create arbitrary files on a victim's system. These files could contain data chosen by an attacker to gain further privileges on a target system. The telnet package used may be installed as part of the Services for UNIX 2.0 package on computers that are running Windows NT 4.0, Windows 2000, or Windows XP.","impact":"A remote attacker may write files onto the system of a user who either visited a malicious web site or opened malicious HTML-formatted mail.The vulnerability could be used to place a file onto the victim's computer which could then run automatically each time the user logged on (i.e., a file installed in the victim's Start folder can allow arbitrary commands to be executed).","resolution":"Apply the patch provided by Microsoft at\nhttp://www.microsoft.com/windows/ie/downloads/critical/q306121/default.asp Note this patch can only be applied after having upgraded to Internet Explorer 5.5 Service Pack 2 (SP2), Internet Explorer 5.01 SP2, or having applied the patch fixing the original vulnerability, Q28043. No previous updates are needed to patch and remove this vulnerability in Internet Explorer 6 clients.","workarounds":"Alternately, remove the telnet client installed as part of the \"Services for Unix 2.0\" package, if installed.","sysaffected":"","thanks":"This variant of the IE \"Telnet Invocation\" vulnerability first discussed in \nCVE-2001-0150\n was discussed in Microsoft Security Bulletin \nMS01-051","author":"This document was written by Jeffrey S. Havrilla.","public":["http://www.microsoft.com/technet/security/bulletin/MS01-015.asp","http://www.microsoft.com/technet/security/bulletin/MS01-051.asp","http://www.microsoft.com/windows/ie/downloads/critical/q306121/default.asp","http://www.microsoft.com/windows/ie/download/critical/q286043/default.asp","http://support.microsoft.com/support/kb/articles/Q286/0/43.ASP","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0150","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0667","http://www.securityfocus.com/bid/2463","http://www.cert.org/advisories/CA-2001-21.html","http://www.ciac.org/ciac/bulletins/l-061.shtml","http://xforce.iss.net/static/6230.php"],"cveids":["CVE-2001-0667"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2001-10-15T19:08:23Z","publicdate":"2001-10-10T00:00:00Z","datefirstpublished":"2001-11-29T04:52:38Z","dateupdated":"2001-11-29T22:33:17Z","revision":43,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"15","cam_impact":"15","cam_easeofexploitation":"12","cam_attackeraccessrequired":"20","cam_scorecurrent":"30.375","cam_scorecurrentwidelyknown":"30.375","cam_scorecurrentwidelyknownexploited":"50.625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":30.375,"vulnote":null}