|
|||
Rule General Information |
---|
Release Date: | 2018-03-05 | |
Rule Name: | PROTOCOL-TELNET Microsoft Windows Telnet Service Buffer Overflow Vulnerability (CVE-2015-0014) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Buffer overflow in the Telnet service in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows Telnet Service Buffer Overflow Vulnerability." | |
Impact: | A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks includes arbitrary code execution and denial of service. | |
Affected OS: | Windows | |
Reference: | MicrosoftSecurityBulletin:MS15-002 SecurityFocusBID:71968 SecurityTrackerID:1031523 |
|
Solutions |
---|
Microsoft has released a patch MS15-002 to eliminate the vulnerability. The patch can be downloaded at: http://technet.microsoft.com/security/bulletin/MS15-002 |