Van Dyke SecureCRT < 4.1.9 Telnet URI Remote Command Execution
High Nessus Network Monitor Plugin ID 2427
SynopsisThe remote host is vulnerable to a buffer overflow.
DescriptionThe remote host is using a vulnerable version of SecureCRT, a SSH/Telnet client built for Microsoft Windows operating systems. It has been reported that SecureCRT does not safely check the protocol handler. As a result, an attacker may be able to exploit it by setting up a malicious SMB share.
SolutionUpgrade to SecureCRT 4.1.9 or higher.