CVE-2005-0868

AS/400 Telnet 5250 terminal emulation clients, as implemented by (1) IBM client access, (2) Bosanova, (3) PowerTerm, (4) Mochasoft, and possibly other emulations, allows malicious AS/400 servers to execute arbitrary commands via a STRPCO (Start PC Organizer) command followed by STRPCCMD (Start PC command), as demonstrated by creating a backdoor account using REXEC.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:bosanova:launcher400:*:*:*:*:*:*:*:*
cpe:2.3:a:ibm:client_access:*:*:*:*:*:*:*:*
cpe:2.3:a:mochasoft:tn5250:*:*:*:*:*:*:*:*
cpe:2.3:a:powerterm:interconnect:*:*:*:*:*:*:*:*

History

20 Nov 2024, 23:56

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=111160242803070&w=2 - () http://marc.info/?l=bugtraq&m=111160242803070&w=2 -
References () http://www.venera.com/downloads/Attack_5250_terminal_emulations_from_iSeries_server.pdf - Exploit () http://www.venera.com/downloads/Attack_5250_terminal_emulations_from_iSeries_server.pdf - Exploit

Information

Published : 2005-05-02 04:00

Updated : 2024-11-20 23:56


NVD link : CVE-2005-0868

Mitre link : CVE-2005-0868

CVE.ORG link : CVE-2005-0868


JSON object : View

Products Affected

mochasoft

  • tn5250

bosanova

  • launcher400

powerterm

  • interconnect

ibm

  • client_access