TITLE: Microsoft HyperTerminal Buffer Overflow Vulnerability SECUNIA ADVISORY ID: SA13464
VERIFY ADVISORY: http://secunia.com/advisories/13464/ CRITICAL: Moderately critical IMPACT: System access WHERE: >From remote OPERATING SYSTEM: Microsoft Windows XP Professional http://secunia.com/product/22/ Microsoft Windows XP Home Edition http://secunia.com/product/16/ Microsoft Windows Server 2003 Web Edition http://secunia.com/product/1176/ Microsoft Windows Server 2003 Standard Edition http://secunia.com/product/1173/ Microsoft Windows Server 2003 Enterprise Edition http://secunia.com/product/1174/ Microsoft Windows Server 2003 Datacenter Edition http://secunia.com/product/1175/ Microsoft Windows NT 4.0 Server, Terminal Server Edition http://secunia.com/product/19/ Microsoft Windows NT 4.0 Server http://secunia.com/product/18/ Microsoft Windows 2000 Server http://secunia.com/product/20/ Microsoft Windows 2000 Professional http://secunia.com/product/1/ Microsoft Windows 2000 Datacenter Server http://secunia.com/product/1177/ Microsoft Windows 2000 Advanced Server http://secunia.com/product/21/ DESCRIPTION: Brett Moore has reported a vulnerability in Microsoft HyperTerminal, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to boundary errors in the handling of HyperTerminal session files and telnet URLs. This can be exploited to cause a buffer overflow by tricking a user into opening a malicious HyperTerminal session file (.ht) or clicking a specially crafted telnet URL in a malicious e-mail or on a website. Successful exploitation can lead to execution of arbitrary code. NOTE: Exploitation via a telnet URL requires that HyperTerminal is set as the default telnet client (not default setting). SOLUTION: Apply patches. Microsoft Windows NT Server 4.0 (requires Service Pack 6a): http://www.microsoft.com/downloads/details.aspx?FamilyId=4C87AF7B-0EE5-4761-AD58-3698D39B62BE Microsoft Windows NT Server 4.0 Terminal Server Edition (requires Service Pack 6): http://www.microsoft.com/downloads/details.aspx?FamilyId=D9F22FA6-1C9B-442A-BA6F-7584DB61C9C2 Microsoft Windows 2000 (requires Service Pack 3 or Service Pack 4): http://www.microsoft.com/downloads/details.aspx?FamilyId=DA3DD6C9-DB7E-40A6-AFD0-5ED87C42190D Microsoft Windows XP (requires Service Pack 1 or Service Pack 2): http://www.microsoft.com/downloads/details.aspx?FamilyId=96BBD220-5E2A-43AD-B8B7-54EC608BD8BE Microsoft Windows XP 64-Bit Edition (requires Service Pack 1): http://www.microsoft.com/downloads/details.aspx?FamilyId=4970DA24-8C3B-4D99-8F89-13E8AF2E4382 Microsoft Windows XP 64-Bit Edition Version 2003: http://www.microsoft.com/downloads/details.aspx?FamilyId=06662D6D-E397-40F7-A7A6-9330FBA17EBF Microsoft Windows Server 2003: http://www.microsoft.com/downloads/details.aspx?FamilyId=3A36E94B-A39F-4B56-8A2D-42F1089DD158 Microsoft Windows Server 2003 64-Bit Edition: http://www.microsoft.com/downloads/details.aspx?FamilyId=06662D6D-E397-40F7-A7A6-9330FBA17EBF ORIGINAL ADVISORY: MS04-043 (KB873339): http://www.microsoft.com/technet/security/bulletin/ms04-043.mspx ---------------------------------------------------------------------- ============= PCWorks Mailing List ================= Don't see your post? Check our posting guidelines & make sure you've followed proper posting procedures, http://pcworkers.com/rules.htm Contact list owner <[EMAIL PROTECTED]> Unsubscribing and other changes: http://pcworkers.com =====================================================
