lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20041217183823.GA20342@netpublishing.com>
From: ggilliss at netpublishing.com (Gregory Gilliss)
Subject: HyperTerminal - Buffer Overflow In .ht File

great, so while I'm using hyperterminal on my network connected machine (!)
to update my hardware for the latest exploit, along comes someone with this
and hacks my client laptop. Somehow I'm glad that I only use UNIX...

-- Greg

On or about 2004.12.15 11:59:56 +0000, Brett Moore (brett.moore@...urity-assessment.com) said:

> ========================================================================
> = HyperTerminal - Buffer Overflow In .ht File
> =
> = MS Bulletin posted: 
> = http://www.microsoft.com/technet/security/bulletin/MS04-043.mspx
> =
> = Affected Software:
> =      Microsoft Windows NT Server 4.0 SP 6a 
> =      Microsoft Windows NT Server 4.0 Terminal Server Edition SP6
> =      Microsoft Windows 2000 SP4
> =      Microsoft Windows XP SP2 
> =      Microsoft Windows XP 64-Bit Edition SP1
> =      Microsoft Windows XP 64-Bit Edition Version 2003 
> =      Microsoft Windows Server 2003 
> =      Microsoft Windows Server 2003 64-Bit Edition
> =
> = Public disclosure on December 15, 2004
> ========================================================================
<<SNIP>>

-- 
Gregory A. Gilliss, CISSP                              E-mail: greg@...liss.com
Computer Security                             WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14 0E 8C A3

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ