Vulnerabilities > CVE-2004-0568 - Unspecified vulnerability in Microsoft products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN microsoft
nessus
Summary
HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow.
Vulnerable Configurations
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS04-043.NASL |
description | The remote host contains a version of the HyperTerminal software that could allow an attacker to execute arbitrary code on the remote host by tricking a victim into using Hyperterminal to log into a rogue host. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 15964 |
published | 2004-12-14 |
reporter | This script is Copyright (C) 2004-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/15964 |
title | MS04-043: Vulnerabilities in HyperTerminal (873339) |
code |
|
Oval
accepted 2013-04-15T04:00:15.404-04:00 class vulnerability contributors name Harvey Rubinovitz organization The MITRE Corporation name Harvey Rubinovitz organization The MITRE Corporation name Harvey Rubinovitz organization The MITRE Corporation name Christine Walzer organization The MITRE Corporation name David Proulx organization The MITRE Corporation name Daniel Tarnu organization GFI Software name Mike Lah organization The MITRE Corporation name Mike Lah organization The MITRE Corporation name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc. name Dragos Prisaca organization G2, Inc.
description HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow. family windows id oval:org.mitre.oval:def:1603 status accepted submitted 2004-12-17T12:00:00.000-04:00 title HyperTerminal Session File Vulnerability (Windows XP,SP1) version 73 accepted 2013-04-15T04:00:18.818-04:00 class vulnerability contributors name Harvey Rubinovitz organization The MITRE Corporation name Harvey Rubinovitz organization The MITRE Corporation name Christine Walzer organization The MITRE Corporation name David Proulx organization The MITRE Corporation name Daniel Tarnu organization GFI Software name Dragos Prisaca organization Gideon Technologies, Inc. name Mike Lah organization The MITRE Corporation name Mike Lah organization The MITRE Corporation name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc. name Dragos Prisaca organization G2, Inc.
description HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow. family windows id oval:org.mitre.oval:def:2545 status accepted submitted 2004-12-17T12:00:00.000-04:00 title HyperTerminal Session File Vulnerability (Windows XP,SP2) version 74 accepted 2013-04-15T04:00:19.523-04:00 class vulnerability contributors name Harvey Rubinovitz organization The MITRE Corporation name Harvey Rubinovitz organization The MITRE Corporation name Harvey Rubinovitz organization The MITRE Corporation name John Hoyland organization Centennial Software name Mike Lah organization The MITRE Corporation name Mike Lah organization The MITRE Corporation name Dragos Prisaca organization G2, Inc.
description HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow. family windows id oval:org.mitre.oval:def:3138 status accepted submitted 2005-01-07T12:00:00.000-04:00 title HyperTerminal Session File Vulnerability (Server 2003) version 68 accepted 2013-04-15T04:00:20.487-04:00 class vulnerability contributors name Harvey Rubinovitz organization The MITRE Corporation name Harvey Rubinovitz organization The MITRE Corporation name John Hoyland organization Centennial Software name John Hoyland organization Centennial Software name Daniel Tarnu organization GFI Software name Jonathan Baker organization The MITRE Corporation name Mike Lah organization The MITRE Corporation name Mike Lah organization The MITRE Corporation name Dragos Prisaca organization G2, Inc.
definition_extensions comment Microsoft Windows NT is installed oval oval:org.mitre.oval:def:36 description HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow. family windows id oval:org.mitre.oval:def:3973 status accepted submitted 2004-12-21T12:00:00.000-04:00 title HyperTerminal Session File Vulnerability (NT 4.0) version 76 accepted 2013-04-15T04:00:22.496-04:00 class vulnerability contributors name Harvey Rubinovitz organization The MITRE Corporation name Harvey Rubinovitz organization The MITRE Corporation name John Hoyland organization Centennial Software name Daniel Tarnu organization GFI Software name Jonathan Baker organization The MITRE Corporation name Mike Lah organization The MITRE Corporation name Mike Lah organization The MITRE Corporation name Dragos Prisaca organization G2, Inc.
definition_extensions comment Microsoft Windows NT is installed oval oval:org.mitre.oval:def:36 description HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow. family windows id oval:org.mitre.oval:def:4508 status accepted submitted 2004-12-21T12:00:00.000-04:00 title HyperTerminal Session File Vulnerability (Terminal Server) version 75 accepted 2013-04-15T04:00:23.463-04:00 class vulnerability contributors name Harvey Rubinovitz organization The MITRE Corporation name Harvey Rubinovitz organization The MITRE Corporation name John Hoyland organization Centennial Software name Daniel Tarnu organization GFI Software name Mike Lah organization The MITRE Corporation name Mike Lah organization The MITRE Corporation name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc. name Dragos Prisaca organization G2, Inc.
description HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow. family windows id oval:org.mitre.oval:def:4741 status accepted submitted 2004-12-21T12:00:00.000-04:00 title HyperTerminal Session File Vulnerability (Windows 2000) version 71
References
- http://marc.info/?l=bugtraq&m=110312618614849&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18336
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4741
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4508
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3973
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3138
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2545
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1603
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-043