HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-08T00:24:26.115Z
Reserved: 2004-06-15T00:00:00
Link: CVE-2004-0568

No data.

Status : Deferred
Published: 2005-01-10T05:00:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2004-0568

No data.