Microsoft KB Archive/276471

= MS00-079: Patch for &quot;HyperTerminal Buffer Overflow&quot; Vulnerability In Windows 2000 =

Article ID: 276471

Article Last Modified on 1/29/2007

-

APPLIES TO


 * Microsoft Windows 2000 Service Pack 1
 * Microsoft Windows 2000 Service Pack 2
 * Microsoft Windows 2000 Advanced Server
 * Microsoft Windows 2000 Advanced Server
 * Microsoft Windows 2000 Service Pack 1
 * Microsoft Windows 2000 Service Pack 2

-



This article was previously published under Q276471



For additional information about a similar problem that may occur in Microsoft Windows NT 4.0, click the following article number to view the article in the Microsoft Knowledge Base:

304158 Patch for &quot;HyperTerminal Buffer Overflow&quot; Vulnerability In Windows NT 4.0



SYMPTOMS
Microsoft has released a patch to address a potential security vulnerability in the HyperTerminal program that is included with Windows 2000. A buffer-overflow vulnerability could allow arbitrary code to be run on a user's computer under special circumstances. For additional information about this vulnerability, see the following Microsoft Web site:

http://www.microsoft.com/technet/security/bulletin/MS00-079.mspx

For a list of frequently asked questions about this vulnerability, see the following Microsoft Web site:

http://www.microsoft.com/technet/security/bulletin/fq00-079.mspx



RESOLUTION
To resolve this problem, obtain the latest service pack for Windows 2000. For additional information, click the following article number to view the article in the Microsoft Knowledge Base:

260910 How to Obtain the Latest Windows 2000 Service Pack

The following files are available for download from the Microsoft Download Center:

English Language Version

Arabic Language Version

Chinese (Simplified) Language Version

Chinese (Traditional) Language Version

Czech Language Version

Danish Language Version

Dutch Language Version

Finnish Language Version

French Language Version

German Language Version

Greek Language Version

Hebrew Language Version

Hungarian Language Version

Italian Language Version

Japanese Language Version

Japanese NEC Language Version

Korean Language Version

Norwegian Language Version

Polish Language Version

Portuguese (Brazilian) Language Version

Portuguese Language Version

Russian Language Version

Spanish Language Version

Swedish Language Version

Turkish Language Version

For additional information about how to download Microsoft Support files, click the following article number to view the article in the Microsoft Knowledge Base:

119591 How to Obtain Microsoft Support Files from Online Services

Microsoft scanned this file for viruses. Microsoft used the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help to prevent any unauthorized changes to the file. The English-language version of this fix should have the following file attributes or later:   Date        Time    Version        Size     File name 04/17/2001 11:53a  5.0.2195.3511   21,776  Hticons.dll 04/17/2001 11:53a  5.0.2195.3511   11,536  Htrn_jis.dll 04/17/2001 11:53a  5.0.2195.3511  575,248  Hypertrm.dll 04/17/2001 11:49a  5.0.2195.3511    6,416  Hypertrm.exe



STATUS
Microsoft has confirmed that this problem may cause a degree of security vulnerability in Microsoft Windows 2000. This problem was first corrected in Windows 2000 Service Pack 3.



MORE INFORMATION
For additional information about this issue in Microsoft Windows 98, Microsoft Windows 98 Second Edition, or Microsoft Windows Millennium Edition, click the article number below to view the article in the Microsoft Knowledge Base:

274548 Patch for 'HyperTerminal Buffer Overflow' Vulnerability in Windows 98, Windows Me

Additional query words: security_patch kbWin2000srp1

Keywords: kbbug kbfix kbwin2000presp3fix kbgraphxlinkcritical kbsecvulnerability kbqfe kbwin2000sp3fix kbsecurity kbsechack kbhotfixserver KB276471

-

[mailto:TECHNET@MICROSOFT.COM Send feedback to Microsoft]

© Microsoft Corporation. All rights reserved.