CVE-2004-0568 in Windowsinfo

Summary

HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow.

Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

Reservation

06/15/2004

Disclosure

01/10/2005

Entries

VDB-1042 (1)

CPE

ready

CVSS

6.3

EPSS

0.26882

Activities

Very Low

Sources

Interested in the pricing of exploits?

See the underground prices here!