Vulnerability Description
Internet Explorer 6 and earlier, when used with the Telnet client in Services for Unix (SFU) 2.0, allows remote attackers to execute commands by spawning Telnet with a log file option on the command line and writing arbitrary code into an executable file which is later executed, aka a new variant of the Telnet Invocation vulnerability as described in CVE-2001-0150.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Internet Explorer | <= 6.0 |
Related Weaknesses (CWE)
References
- http://www.ciac.org/ciac/bulletins/m-024.shtmlBroken Link
- http://www.kb.cert.org/vuls/id/952611Third Party AdvisoryUS Government Resource
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-05PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/7260Third Party AdvisoryVDB Entry
- http://www.ciac.org/ciac/bulletins/m-024.shtmlBroken Link
- http://www.kb.cert.org/vuls/id/952611Third Party AdvisoryUS Government Resource
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-05PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/7260Third Party AdvisoryVDB Entry
FAQ
What is CVE-2001-0667?
CVE-2001-0667 is a vulnerability with a CVSS score of 7.3 (HIGH). Internet Explorer 6 and earlier, when used with the Telnet client in Services for Unix (SFU) 2.0, allows remote attackers to execute commands by spawning Telnet with a log file option on the command l...
How severe is CVE-2001-0667?
CVE-2001-0667 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2001-0667?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Internet Explorer.