Windows 98, ME,以及2000平台上Hilgraeve, Inc. HyperTerminal客户端缓冲区溢出漏洞

Windows 98, ME,以及2000平台上Hilgraeve, Inc. HyperTerminal客户端缓冲区溢出漏洞

漏洞ID 1106049 漏洞类型 缓冲区溢出
发布时间 2000-10-18 更新时间 2005-10-12
图片[1]-Windows 98, ME,以及2000平台上Hilgraeve, Inc. HyperTerminal客户端缓冲区溢出漏洞-安全小百科CVE编号 CVE-2000-0991
图片[2]-Windows 98, ME,以及2000平台上Hilgraeve, Inc. HyperTerminal客户端缓冲区溢出漏洞-安全小百科CNNVD-ID CNNVD-200012-135
漏洞平台 Windows CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/20307
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200012-135
|漏洞详情
Windows98,ME,以及2000平台上Hilgraeve,Inc.HyperTerminal客户端存在缓冲区溢出漏洞。远程攻击者借助超长远程登录URL执行任意命令,也称为“超级终端缓冲区溢出”漏洞。
|漏洞EXP
source: http://www.securityfocus.com/bid/1815/info


Hilgraeve HyperTerminal is a communications/telnet application shipped and installed with every copy of Microsoft Windows 98, ME, NT 4.0, and 2000. It is the default telnet client in Microsoft 98 and ME but not in Windows NT 4.0 / 2000.

A buffer overflow condition exists when a user attempts to access a telnet address over 153 characters long. Depending on the data entered, a denial of service attack or arbitrary code could be launched by a malicious third party. A specially malformed telnet address could be launched on a remote system if it were embedded in a HTML page or email message.

Although HyperTerminal is also shipped with NT 4.0, it is not susceptible to this vulnerability because it cannot be configured to be the default telnet client.

telnet://<string consisting of over 153 characters>
|参考资料

来源:XF
名称:win-hyperterminal-telnet-bo
链接:http://xforce.iss.net/static/5387.php
来源:BID
名称:1815
链接:http://www.securityfocus.com/bid/1815
来源:MS
名称:MS00-079
链接:http://www.microsoft.com/technet/security/bulletin/ms00-079.asp

相关推荐: IBM AIX Runtime Linker Search Path Vulnerability

IBM AIX Runtime Linker Search Path Vulnerability 漏洞ID 1104301 漏洞类型 Environment Error 发布时间 2000-03-14 更新时间 2000-03-14 CVE编号 N/A CNN…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享