Microsoft Windows 2000 Security Patch: 'HyperTerminal Buffer Overflow' VulnerabilityThe HyperTerminal application is a utility that installs, by default, on all versions of Windows 98, 98SE, Windows ME, Windows NT, and Windows 2000. The product contains an unchecked buffer in a secti | |
Download |
Microsoft Windows 2000 Security Patch: 'HyperTerminal Buffer Overflow' Vulnerability Ranking & Summary
Advertisement
Microsoft Windows 2000 Security Patch: 'HyperTerminal Buffer Overflow' Vulnerability Tags
- windows HyperTerminal windows customizer Windows Product Windows 7 Windows Me Plus Windows 7 look Windows sudo Windows 98SE Autopatcher Windows 98SE update windows sixes Windows 2000 SP Windows 2000 Windows Enhace windows driver Windows Restarter Windows Sysinternals Windows Seizer Windows default nonrectangular windows windows hpaftpd windows bootdisk Windows GodMode Windows SideShow Windows Ceaner windows look Windows Soundpack Old Windows Windows Superbar Windows 98 enhancement Windows 98 windows minimiser Windows webfolder Windows 8 Windows Seven Windows 7 Downgrade Downgrade Windows Windows 7 Customizer Windows Subsystem driver windows WINDOWS 3.1x DDC for Windows windows help draggable windows windows application windows icalendar windows ircd arping for windows windows xserver winpopup for windows NT windows tracert Windows NT chroot for windows cron for windows Windows Boosts utility windows horseshoes tnet1130 windows 7 senuti for windows ichat for windows xcode for windows senuti windows windows 7 for adium for windows ichat windows xcode windows hyperterminal vista empathy windows windows me adium windows windows nt 4.0 windows utility f-prot for windows
Microsoft Windows 2000 Security Patch: 'HyperTerminal Buffer Overflow' Vulnerability Description
The HyperTerminal application is a utility that installs, by default, on all versions of Windows 98, 98SE, Windows ME, Windows NT, and Windows 2000. The product contains an unchecked buffer in a section of the code that processes Telnet URLs. If a user opened an HTML mail that contained a particularly malformed Telnet URL, it would result in a buffer overrun that could enable the creator of the mail to cause arbitrary code to run on the user?s system. HyperTerminal is the default Telnet client on Windows 98, 98SE and ME. However, it is not the default Telnet client on Windows 2000, and Windows 2000 users who have not taken steps to make it the default Telnet client would not be affected by the vulnerability. (Windows NT4.0 is not affected by this vulnerability. The HyperTerminal client that ships with Windows NT4 does not include a TCP/IP connection method. As such, the NT4 HyperTerminal client cannot be setup as the default telnet client, and would not launch in response to a supplied Telnet URL.)
Microsoft Windows 2000 Security Patch: 'HyperTerminal Buffer Overflow' Vulnerability Related Software