AS/400 Telnet 5250 terminal emulation clients, as implemented by (1) IBM client access, (2) Bosanova, (3) PowerTerm, (4) Mochasoft, and possibly other emulations, allows malicious AS/400 servers to execute arbitrary commands via a STRPCO (Start PC Organizer) command followed by STRPCCMD (Start PC command), as demonstrated by creating a backdoor account using REXEC.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:56
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=111160242803070&w=2 - | |
References | () http://www.venera.com/downloads/Attack_5250_terminal_emulations_from_iSeries_server.pdf - Exploit |
Information
Published : 2005-05-02 04:00
Updated : 2024-11-20 23:56
NVD link : CVE-2005-0868
Mitre link : CVE-2005-0868
CVE.ORG link : CVE-2005-0868
JSON object : View
Products Affected
mochasoft
- tn5250
bosanova
- launcher400
powerterm
- interconnect
ibm
- client_access
CWE