Vulnerability Name: | CVE-2005-2120 (CCN-22481) | ||||||||||||||||
Assigned: | 2005-10-11 | ||||||||||||||||
Published: | 2005-10-11 | ||||||||||||||||
Updated: | 2018-10-12 | ||||||||||||||||
Summary: | Stack-based buffer overflow in the Plug and Play (PnP) service (UMPNPMGR.DLL) in Microsoft Windows 2000 SP4, and XP SP1 and SP2, allows remote or local authenticated attackers to execute arbitrary code via a large number of "\" (backslash) characters in a registry key name, which triggers the overflow in a wsprintfW function call. | ||||||||||||||||
CVSS v3 Severity: | 4.8 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L)
| ||||||||||||||||
CVSS v2 Severity: | 6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
| ||||||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2005-2120 Source: CCN Type: SA17166 Microsoft Windows Plug-and-Play Service Buffer Overflows Source: SECUNIA Type: Patch, Vendor Advisory 17166 Source: CCN Type: SA17172 Avaya Various Products Multiple Vulnerabilities Source: SECUNIA Type: UNKNOWN 17172 Source: CCN Type: SA17223 Nortel Centrex IP Client Manager Multiple Vulnerabilities Source: SECUNIA Type: UNKNOWN 17223 Source: SREASON Type: UNKNOWN 71 Source: CCN Type: SECTRACK ID: 1015042 Microsoft Windows Plug and Play Buffer Overflow Lets Remote Users Execute Arbitrary Code Source: SECTRACK Type: Patch 1015042 Source: CONFIRM Type: UNKNOWN http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf Source: EEYE Type: Patch, Vendor Advisory AD20051011c Source: CCN Type: US-CERT VU#214572 Microsoft Plug and Play fails to properly validate user supplied data Source: CERT-VN Type: Third Party Advisory, US Government Resource VU#214572 Source: CCN Type: Microsoft Security Bulletin MS05-047 Vulnerability in Plug and Play Could Allow Remote Code Execution and Local Elevation of Privilege (905749) Source: OSVDB Type: UNKNOWN 18830 Source: CCN Type: OSVDB ID: 18830 Microsoft Windows UMPNPMGR wsprintfW Remote Overflow Source: BID Type: Exploit, Patch 15065 Source: CCN Type: BID-15065 Microsoft Windows Plug And Play UMPNPMGR.DLL wsprintfW Buffer Overflow Vulnerability Source: CERT Type: Third Party Advisory, US Government Resource TA05-284A Source: MS Type: UNKNOWN MS05-047 Source: XF Type: UNKNOWN msrpc-plugandplay-devicebo(22481) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:1244 Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:1328 Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:1519 Source: CCN Type: Rapid7 Vulnerability and Exploit Database [05-30-2018] Microsoft Plug and Play Service Registry Overflow | ||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |