Used Windows Me HyperTerminal Buffer Overflow Vulnerability for Windows? Share your experience and help other users.
Key Details of Windows Me HyperTerminal Buffer Overflow Vulnerability
- Get this HyperTerminal Vulnerability Patch from Microsoft.
- Last updated on
- There have been 7 updates
- Virus scan status:
Clean (it’s extremely likely that this software program is clean)
Developer’s Description
The HyperTerminal application is a utility that installs, by default, on all versions of Windows 98, 98SE, Windows NT, Windows Me, and Windows 2000. The product contains an unchecked buffer in a section of the code that processes Telnet URLs. If a user opened an HTML mail that contained a particularly malformed Telnet URL, it would result in a buffer overrun that could enable the creator of the mail to cause arbitrary code to run on the user's system. Please note that, although a Telnet URL is involved in this vulnerability, there is no relationship between this vulnerability and the "Windows 2000 Telnet Client NTLM Authentication" vulnerability discussed in MS00-067.
HyperTerminal is the default Telnet client on Windows 98, 98SE, and Me. However, it is not the default Telnet client on Windows 2000, and Windows 2000 users who have not taken steps to make it the default Telnet client would not be affected by the vulnerability.
Used Windows Me HyperTerminal Buffer Overflow Vulnerability for Windows? Share your experience and help other users.
Explore More
CrypticFile
Trial versionBlowFish 2000
Trial versionFalcove
Trial versionXRAY - Intrusion Detection System
Trial versionSQL Procedure Encryption
FreeFast File Encryptor
Trial versioniFufi2
Trial versionMedia Fortress
Trial versionOpen Sesame
FreeThe Ultimate Drive Wiper
Trial versionGraphics Rendering Engine Vulnerability Security Update
FreeEvidence-Blaster
Trial version