TITLE:
Microsoft HyperTerminal Buffer Overflow Vulnerability

SECUNIA ADVISORY ID:
SA13464

VERIFY ADVISORY:
http://secunia.com/advisories/13464/

CRITICAL:
Moderately critical

IMPACT:
System access

WHERE:
>From remote

OPERATING SYSTEM:
Microsoft Windows XP Professional
http://secunia.com/product/22/
Microsoft Windows XP Home Edition
http://secunia.com/product/16/
Microsoft Windows Server 2003 Web Edition
http://secunia.com/product/1176/
Microsoft Windows Server 2003 Standard Edition
http://secunia.com/product/1173/
Microsoft Windows Server 2003 Enterprise Edition
http://secunia.com/product/1174/
Microsoft Windows Server 2003 Datacenter Edition
http://secunia.com/product/1175/
Microsoft Windows NT 4.0 Server, Terminal Server Edition
http://secunia.com/product/19/
Microsoft Windows NT 4.0 Server
http://secunia.com/product/18/
Microsoft Windows 2000 Server
http://secunia.com/product/20/
Microsoft Windows 2000 Professional
http://secunia.com/product/1/
Microsoft Windows 2000 Datacenter Server
http://secunia.com/product/1177/
Microsoft Windows 2000 Advanced Server
http://secunia.com/product/21/

DESCRIPTION:
Brett Moore has reported a vulnerability in Microsoft
HyperTerminal, which can be exploited by malicious
people to compromise a user's system.

The vulnerability is caused due to boundary errors in the
handling of HyperTerminal session files and telnet URLs.
This can be exploited to cause a buffer overflow by
tricking a user into opening a malicious HyperTerminal
session file (.ht) or clicking a specially crafted telnet URL
in a malicious e-mail or on a website.

Successful exploitation can lead to execution of arbitrary
code.

NOTE: Exploitation via a telnet URL requires that HyperTerminal
is set as the default telnet client (not default setting).

SOLUTION:
Apply patches.

Microsoft Windows NT Server 4.0 (requires Service Pack 6a):
http://www.microsoft.com/downloads/details.aspx?FamilyId=4C87AF7B-0EE5-4761-AD58-3698D39B62BE

Microsoft Windows NT Server 4.0 Terminal Server Edition
(requires Service Pack 6):
http://www.microsoft.com/downloads/details.aspx?FamilyId=D9F22FA6-1C9B-442A-BA6F-7584DB61C9C2

Microsoft Windows 2000 (requires  Service Pack 3 or
Service Pack 4):
http://www.microsoft.com/downloads/details.aspx?FamilyId=DA3DD6C9-DB7E-40A6-AFD0-5ED87C42190D

Microsoft Windows XP (requires Service Pack 1 or
Service Pack 2):
http://www.microsoft.com/downloads/details.aspx?FamilyId=96BBD220-5E2A-43AD-B8B7-54EC608BD8BE

Microsoft Windows XP 64-Bit Edition (requires Service Pack 1):
http://www.microsoft.com/downloads/details.aspx?FamilyId=4970DA24-8C3B-4D99-8F89-13E8AF2E4382

Microsoft Windows XP 64-Bit Edition Version 2003:
http://www.microsoft.com/downloads/details.aspx?FamilyId=06662D6D-E397-40F7-A7A6-9330FBA17EBF

Microsoft Windows Server 2003:
http://www.microsoft.com/downloads/details.aspx?FamilyId=3A36E94B-A39F-4B56-8A2D-42F1089DD158

Microsoft Windows Server 2003 64-Bit Edition:
http://www.microsoft.com/downloads/details.aspx?FamilyId=06662D6D-E397-40F7-A7A6-9330FBA17EBF

ORIGINAL ADVISORY:
MS04-043 (KB873339):
http://www.microsoft.com/technet/security/bulletin/ms04-043.mspx

----------------------------------------------------------------------
============= PCWorks Mailing List =================
Don't see your post? Check our posting guidelines &
make sure you've followed proper posting procedures,
http://pcworkers.com/rules.htm
Contact list owner <[EMAIL PROTECTED]>
Unsubscribing and other changes: http://pcworkers.com
=====================================================

Reply via email to