This update resolves the "HyperTerminal Buffer Overflow" security vulnerability in Windows 2000. If you receive and open an HTML e-mail message that contains a particularly malformed Web address (URL), the URL can be used to exploit this vulnerability and run arbitrary code on your computer. Note Although HyperTerminal ships as part of several Microsoft products, it was developed by Hilgraeve, Inc. Additional information on the vulnerability and a patch for their full version product, HyperTerminal Private Edition, is available from the Hilgraeve Web site, at http://www.hilgraeve.com. For more information about these vulnerabilities, please see Microsoft Security Bulletin MS00-079.
Price |
USD 0 |
License |
Free |
File Size |
372.23 kB |
Version |
Update |
Operating System |
Windows,
Windows 98,
Windows 2000,
Windows XP
|
System Requirements |
Windows NT 4 SP 6Windows 2003 SP 1Windows XP AMD 64-bitWindows XP 64-bit SP 1Windows NT 4 SP 2Windows 2000 SP 1Windows 2003 64-bitWindows 2003 AMD 64-bitWindows XP 64-bit SP 2Windows NT 4 SP 3Windows 2000 SP 2Windows Server 2003 x64 R2Windows 2000Windows 2003 64-bit SP 1Windows Vista AMD 64-bitWindows XP Itanium 64-bitWindows NT 4 SP 4Windows 2000 SP 3Windows NT 4Windows XP 32-bitWindows XP SP 1Windows Server 2003 x86 R2Windows MEWindows 2003 Itanium 64-bitWindows NT 4 SP 5Windows 2000 SP 4Windows Vista 32-bitWindows XP 64-bitWindows NT 4 SP 1Windows Server 2008 x64Windows NT 3Windows Server 2008 x86Windows XPWindows Server 2008Windows 2003Windows Vista Itanium 64-bitWindows XP Itanium 64-bit SP 1Windows 2003 32-bitWindows XP Itanium 64-bit SP 2Windows XP SP 2Windows 95Windows 98Windows VistaWindows NTWindows 2003 Itanium 64-bit SP 1Windows XP Pro |