Vulnerability Name:

CVE-2005-2120 (CCN-22481)

Assigned:2005-10-11
Published:2005-10-11
Updated:2018-10-12
Summary:Stack-based buffer overflow in the Plug and Play (PnP) service (UMPNPMGR.DLL) in Microsoft Windows 2000 SP4, and XP SP1 and SP2, allows remote or local authenticated attackers to execute arbitrary code via a large number of "\" (backslash) characters in a registry key name, which triggers the overflow in a wsprintfW function call.
CVSS v3 Severity:4.8 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.3 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2005-2120

Source: CCN
Type: SA17166
Microsoft Windows Plug-and-Play Service Buffer Overflows

Source: SECUNIA
Type: Patch, Vendor Advisory
17166

Source: CCN
Type: SA17172
Avaya Various Products Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
17172

Source: CCN
Type: SA17223
Nortel Centrex IP Client Manager Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
17223

Source: SREASON
Type: UNKNOWN
71

Source: CCN
Type: SECTRACK ID: 1015042
Microsoft Windows Plug and Play Buffer Overflow Lets Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: Patch
1015042

Source: CONFIRM
Type: UNKNOWN
http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf

Source: EEYE
Type: Patch, Vendor Advisory
AD20051011c

Source: CCN
Type: US-CERT VU#214572
Microsoft Plug and Play fails to properly validate user supplied data

Source: CERT-VN
Type: Third Party Advisory, US Government Resource
VU#214572

Source: CCN
Type: Microsoft Security Bulletin MS05-047
Vulnerability in Plug and Play Could Allow Remote Code Execution and Local Elevation of Privilege (905749)

Source: OSVDB
Type: UNKNOWN
18830

Source: CCN
Type: OSVDB ID: 18830
Microsoft Windows UMPNPMGR wsprintfW Remote Overflow

Source: BID
Type: Exploit, Patch
15065

Source: CCN
Type: BID-15065
Microsoft Windows Plug And Play UMPNPMGR.DLL wsprintfW Buffer Overflow Vulnerability

Source: CERT
Type: Third Party Advisory, US Government Resource
TA05-284A

Source: MS
Type: UNKNOWN
MS05-047

Source: XF
Type: UNKNOWN
msrpc-plugandplay-devicebo(22481)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:1244

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:1328

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:1519

Source: CCN
Type: Rapid7 Vulnerability and Exploit Database [05-30-2018]
Microsoft Plug and Play Service Registry Overflow

Vulnerable Configuration:Configuration 1:
  • cpe:/o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:microsoft:windows_xp:*:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:xp:sp2:*:*:*:*:*:*
  • AND
  • cpe:/o:microsoft:windows_xp:*:*:*:*:*:*:x64:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:1244
    V
    Plug and Play User Data Validation Vulnerability (Windows 2000)
    2011-05-16
    oval:org.mitre.oval:def:1328
    V
    Plug and Play User Data Validation Vulnerability (WinXP,SP1)
    2011-05-16
    oval:org.mitre.oval:def:1519
    V
    Plug and Play User Data Validation Vulnerability (WinXP,SP2)
    2011-05-16
    BACK
    microsoft windows 2000 * sp4
    microsoft windows xp * sp1
    microsoft windows xp * sp2
    microsoft windows xp * sp1
    microsoft windows 2000 * sp4
    microsoft windows xp sp2
    microsoft windows xp *