HyperTerminal Session File Vulnerability (Windows 2000)ID: oval:org.mitre.oval:def:4741 | Date: (C)2004-12-21 (M)2021-07-09 |
Class: VULNERABILITY | Family: windows |
HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow.
Platform: |
Microsoft Windows 2000 |