Executive Summary

Informations
Name MS04-043 First vendor Publication N/A
Vendor Microsoft Last vendor Modification N/A
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability in HyperTerminal Could Allow Code Execution (873339)

CAPEC : Common Attack Pattern Enumeration & Classification

Id Name
CAPEC-47 Buffer Overflow via Parameter Expansion

CWE : Common Weakness Enumeration

% Id Name

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:1603
 
Oval ID: oval:org.mitre.oval:def:1603
Title: HyperTerminal Session File Vulnerability (Windows XP,SP1)
Description: HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow.
Family: windows Class: vulnerability
Reference(s): CVE-2004-0568
Version: 10
Platform(s): Microsoft Windows XP
Product(s): HyperTerminal
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:2545
 
Oval ID: oval:org.mitre.oval:def:2545
Title: HyperTerminal Session File Vulnerability (Windows XP,SP2)
Description: HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow.
Family: windows Class: vulnerability
Reference(s): CVE-2004-0568
Version: 10
Platform(s): Microsoft Windows XP
Product(s): HyperTerminal
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:3138
 
Oval ID: oval:org.mitre.oval:def:3138
Title: HyperTerminal Session File Vulnerability (Server 2003)
Description: HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow.
Family: windows Class: vulnerability
Reference(s): CVE-2004-0568
Version: 5
Platform(s): Microsoft Windows Server 2003
Product(s): HyperTerminal
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:3973
 
Oval ID: oval:org.mitre.oval:def:3973
Title: HyperTerminal Session File Vulnerability (NT 4.0)
Description: HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow.
Family: windows Class: vulnerability
Reference(s): CVE-2004-0568
Version: 7
Platform(s): Microsoft Windows NT
Product(s): HyperTerminal
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:4508
 
Oval ID: oval:org.mitre.oval:def:4508
Title: HyperTerminal Session File Vulnerability (Terminal Server)
Description: HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow.
Family: windows Class: vulnerability
Reference(s): CVE-2004-0568
Version: 6
Platform(s): Microsoft Windows NT
Product(s): HyperTerminal
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:4741
 
Oval ID: oval:org.mitre.oval:def:4741
Title: HyperTerminal Session File Vulnerability (Windows 2000)
Description: HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow.
Family: windows Class: vulnerability
Reference(s): CVE-2004-0568
Version: 8
Platform(s): Microsoft Windows 2000
Product(s): HyperTerminal
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 5
Os 12
Os 48
Os 9

Open Source Vulnerability Database (OSVDB)

Id Description
12374 Microsoft Windows HyperTerminal Session File Remote Overflow

Nessus® Vulnerability Scanner

Date Description
2004-12-14 Name : Arbitrary code can be executed on the remote host through HyperTerminal.
File : smb_nt_ms04-043.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:45:05
  • Multiple Updates