HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote malicious users to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
microsoft windows 2000 |
||
microsoft windows 2003 server enterprise |
||
microsoft windows 2003 server standard |
||
microsoft windows 2003 server web |
||
microsoft windows nt 4.0 |
||
microsoft windows xp |
||
microsoft windows 2003 server datacenter_64-bit |
||
microsoft windows 2003 server r2 |
||
microsoft windows 2003 server enterprise_64-bit |