HTTP: Microsoft Telnet Protocol Handler Insecure Loading
This signature detects attempts to exploit a known remote code execution vulnerability in the Microsoft telnet.exe service. It is due to a design weakness in the way telnet protocol handler is implemented. Remote attackers can exploit this by enticing target users to download a malicious dll file. A successful attack can result in loading the attacker-controlled library and execution of arbitrary code with the privileges of the logged-in user. If a user is logged-on with administrative user rights, an attacker can take complete control of the affected system.
Extended Description
Microsoft Internet Explorer is prone to a vulnerability that lets attackers execute arbitrary remote code. An attacker can exploit this issue by enticing a legitimate user to use a vulnerable version of the application to access an HTML file from a network share location that contains a specially crafted executable file.
Affected Products
Avaya messaging_application_server,Avaya meeting_exchange
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Microsoft
Avaya
9.3