eliminates a security vulnerability in the Telnet client which could, under certain circumstances, allow a malicious user to obtain cryptographically protected logon credentials from another user.
This vulnerability could enable a malicious user to automatically request a Telnet session from an unsuspecting user’s machine to the malicious user’s server.
As part of this session, the user’s cryptographically protected NTLM (NT LanMan) authentication credentials could be passed to the malicious user’s server. The malicious user could obtain these credentials and subject them to offline examination to discover the user’s clear-text password.
This vulnerability would only provide the malicious user with the password credentials of another user. It would not, by itself, allow the malicious user to take any actions on the user’s system.
Microsoft Windows 2000 Telnet Client NTLM Authentication Pat runs on
Windows 2000
and is available under the
Freeware
license
— the installer is 186 KB.
We’ve catalogued it under
Telnet.
✓
Verified clean. Every Microsoft Windows 2000 Telnet Client NTLM Authentication Pat build on SoftLookup is scanned for viruses, spyware, adware, trojans and backdoors. We re-test on every update.
Help fellow users decide. Share your experience with Microsoft Windows 2000 Telnet Client NTLM Authentication Pat.