CVE Vulnerabilities

CVE-2004-0568

Published: Jan 10, 2005 | Modified: Apr 03, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
10 HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow.

Affected Software

NameVendorStart VersionEnd Version
Windows_2000Microsoft**
Windows_2003_serverMicrosoftdatacenter_64-bit-sp1_beta_1 (including)datacenter_64-bit-sp1_beta_1 (including)
Windows_2003_serverMicrosoftenterprise (including)enterprise (including)
Windows_2003_serverMicrosoftenterprise-sp1_beta_1 (including)enterprise-sp1_beta_1 (including)
Windows_2003_serverMicrosoftenterprise_64-bit (including)enterprise_64-bit (including)
Windows_2003_serverMicrosoftenterprise_64-bit-sp1_beta_1 (including)enterprise_64-bit-sp1_beta_1 (including)
Windows_2003_serverMicrosoftr2 (including)r2 (including)
Windows_2003_serverMicrosoftr2-sp1_beta_1 (including)r2-sp1_beta_1 (including)
Windows_2003_serverMicrosoftstandard (including)standard (including)
Windows_2003_serverMicrosoftstandard-sp1_beta_1 (including)standard-sp1_beta_1 (including)
Windows_2003_serverMicrosoftweb (including)web (including)
Windows_2003_serverMicrosoftweb-sp1_beta_1 (including)web-sp1_beta_1 (including)
Windows_ntMicrosoft4.0 (including)4.0 (including)
Windows_ntMicrosoft4.0-sp1 (including)4.0-sp1 (including)
Windows_ntMicrosoft4.0-sp2 (including)4.0-sp2 (including)
Windows_ntMicrosoft4.0-sp3 (including)4.0-sp3 (including)
Windows_ntMicrosoft4.0-sp4 (including)4.0-sp4 (including)
Windows_ntMicrosoft4.0-sp5 (including)4.0-sp5 (including)
Windows_ntMicrosoft4.0-sp6 (including)4.0-sp6 (including)
Windows_ntMicrosoft4.0-sp6a (including)4.0-sp6a (including)
Windows_xpMicrosoft**

References