### [CVE-2004-0568](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0568) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow. ### POC #### Reference - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-043 #### Github No PoCs found on GitHub currently.