CVE-2005-4197

tunnelform.yaws in Nortel SSL VPN 4.2.1.6 allows remote attackers to execute arbitrary commands via a link in the a parameter, which is executed with extra privileges in a cryptographically signed Java Applet.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nortel:ssl_vpn:*:*:*:*:*:*:*:*
cpe:2.3:a:nortel:ssl_vpn:4.1.2.11:*:*:*:*:*:*:*
cpe:2.3:a:nortel:ssl_vpn:4.1.2.12:*:*:*:*:*:*:*

History

21 Nov 2024, 00:03

Type Values Removed Values Added
References () http://secunia.com/advisories/17974 - Vendor Advisory () http://secunia.com/advisories/17974 - Vendor Advisory
References () http://securitytracker.com/id?1015341 - () http://securitytracker.com/id?1015341 -
References () http://www.sec-consult.com/247.html - Exploit () http://www.sec-consult.com/247.html - Exploit
References () http://www.securityfocus.com/archive/1/419263/100/0/threaded - () http://www.securityfocus.com/archive/1/419263/100/0/threaded -
References () http://www.securityfocus.com/bid/15798 - Exploit () http://www.securityfocus.com/bid/15798 - Exploit
References () http://www.vupen.com/english/advisories/2005/2845 - () http://www.vupen.com/english/advisories/2005/2845 -

Information

Published : 2005-12-13 11:03

Updated : 2024-11-21 00:03


NVD link : CVE-2005-4197

Mitre link : CVE-2005-4197

CVE.ORG link : CVE-2005-4197


JSON object : View

Products Affected

nortel

  • ssl_vpn