Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Windows >> Van Dyke SecureCRT Remote Command Execution Vulnerability


Vulnerability Assessment Details

Van Dyke SecureCRT Remote Command Execution Vulnerability

Vulnerability Assessment Summary
Acertains the version of SecureCRT

Detailed Explanation for this Vulnerability Assessment

The remote host is using a vulnerable version of SecureCRT, a
SSH/Telnet client built for Microsoft Windows operation systems.

It has been reported that SecureCRT does not safely check the protocol
handler. As a result, a possible hacker may be able to exploit it by setting
up a malicious SMB share.

Solution : Upgrade to SecureCRT 4.1.9 or newer.
Network Security Threat Level: Medium

Networks Security ID: 11731

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Cisco CP-MIC-WIRED-S Optional Wired Microphone Kit for Conference Phone 8831
$200.0
Cisco CP-MIC-WIRED-S Optional Wired Microphone Kit for Conference Phone 8831 pictureCisco WS-C3560G-24PS-S PoE 802.3af IP Base 24x Gb Port Switch *Faceplate damage*
$115.0
Cisco WS-C3560G-24PS-S PoE 802.3af IP Base 24x Gb Port Switch *Faceplate damage* pictureCisco CWDM GBIC 1570 Transceiver CWDM-GBIC-1570
$74.99
Cisco CWDM GBIC 1570 Transceiver CWDM-GBIC-1570 pictureCisco WS-C3560-48PS-S 3560 PoE 48 Port Catalyst Network Switch
$64.99
Cisco WS-C3560-48PS-S 3560 PoE 48 Port Catalyst Network Switch picture


Discussions

No Discussions have been posted on this vulnerability.