CVE-2005-2120

Stack-based buffer overflow in the Plug and Play (PnP) service (UMPNPMGR.DLL) in Microsoft Windows 2000 SP4, and XP SP1 and SP2, allows remote or local authenticated attackers to execute arbitrary code via a large number of "\" (backslash) characters in a registry key name, which triggers the overflow in a wsprintfW function call.
References
Link Resource
http://secunia.com/advisories/17166 Patch Vendor Advisory
http://secunia.com/advisories/17172
http://secunia.com/advisories/17223
http://securityreason.com/securityalert/71
http://securitytracker.com/id?1015042 Patch
http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf
http://www.eeye.com/html/research/advisories/AD20051011c.html Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/214572 Third Party Advisory US Government Resource
http://www.osvdb.org/18830
http://www.securityfocus.com/bid/15065 Exploit Patch
http://www.us-cert.gov/cas/techalerts/TA05-284A.html Third Party Advisory US Government Resource
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-047
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1244
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1328
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1519
http://secunia.com/advisories/17166 Patch Vendor Advisory
http://secunia.com/advisories/17172
http://secunia.com/advisories/17223
http://securityreason.com/securityalert/71
http://securitytracker.com/id?1015042 Patch
http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf
http://www.eeye.com/html/research/advisories/AD20051011c.html Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/214572 Third Party Advisory US Government Resource
http://www.osvdb.org/18830
http://www.securityfocus.com/bid/15065 Exploit Patch
http://www.us-cert.gov/cas/techalerts/TA05-284A.html Third Party Advisory US Government Resource
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-047
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1244
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1328
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1519
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*

History

20 Nov 2024, 23:58

Type Values Removed Values Added
References () http://secunia.com/advisories/17166 - Patch, Vendor Advisory () http://secunia.com/advisories/17166 - Patch, Vendor Advisory
References () http://secunia.com/advisories/17172 - () http://secunia.com/advisories/17172 -
References () http://secunia.com/advisories/17223 - () http://secunia.com/advisories/17223 -
References () http://securityreason.com/securityalert/71 - () http://securityreason.com/securityalert/71 -
References () http://securitytracker.com/id?1015042 - Patch () http://securitytracker.com/id?1015042 - Patch
References () http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf - () http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf -
References () http://www.eeye.com/html/research/advisories/AD20051011c.html - Patch, Vendor Advisory () http://www.eeye.com/html/research/advisories/AD20051011c.html - Patch, Vendor Advisory
References () http://www.kb.cert.org/vuls/id/214572 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/214572 - Third Party Advisory, US Government Resource
References () http://www.osvdb.org/18830 - () http://www.osvdb.org/18830 -
References () http://www.securityfocus.com/bid/15065 - Exploit, Patch () http://www.securityfocus.com/bid/15065 - Exploit, Patch
References () http://www.us-cert.gov/cas/techalerts/TA05-284A.html - Third Party Advisory, US Government Resource () http://www.us-cert.gov/cas/techalerts/TA05-284A.html - Third Party Advisory, US Government Resource
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-047 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-047 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1244 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1244 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1328 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1328 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1519 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1519 -

Information

Published : 2005-10-13 10:02

Updated : 2024-11-20 23:58


NVD link : CVE-2005-2120

Mitre link : CVE-2005-2120

CVE.ORG link : CVE-2005-2120


JSON object : View

Products Affected

microsoft

  • windows_xp
  • windows_2000