CVE-2005-2123

Multiple integer overflows in the Graphics Rendering Engine (GDI32.DLL) in Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allow remote attackers to execute arbitrary code via crafted Windows Metafile (WMF) and Enhanced Metafile (EMF) format images that lead to heap-based buffer overflows, as demonstrated using MRBP16::bCheckRecord.
References
Link Resource
http://secunia.com/advisories/17223
http://secunia.com/advisories/17461
http://secunia.com/advisories/17498
http://securitytracker.com/id?1015168
http://support.avaya.com/elmodocs2/security/ASA-2005-228.pdf
http://www.eeye.com/html/research/advisories/AD20051108b.html Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/300549 Patch Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/15352
http://www.us-cert.gov/cas/techalerts/TA05-312A.html US Government Resource
http://www.vupen.com/english/advisories/2005/2348
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-053
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1063
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1175
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1263
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1546
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A701
http://secunia.com/advisories/17223
http://secunia.com/advisories/17461
http://secunia.com/advisories/17498
http://securitytracker.com/id?1015168
http://support.avaya.com/elmodocs2/security/ASA-2005-228.pdf
http://www.eeye.com/html/research/advisories/AD20051108b.html Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/300549 Patch Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/15352
http://www.us-cert.gov/cas/techalerts/TA05-312A.html US Government Resource
http://www.vupen.com/english/advisories/2005/2348
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-053
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1063
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1175
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1263
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1546
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A701
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:64-bit:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:itanium:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:sp1:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:sp1:*:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*

History

20 Nov 2024, 23:58

Type Values Removed Values Added
References () http://secunia.com/advisories/17223 - () http://secunia.com/advisories/17223 -
References () http://secunia.com/advisories/17461 - () http://secunia.com/advisories/17461 -
References () http://secunia.com/advisories/17498 - () http://secunia.com/advisories/17498 -
References () http://securitytracker.com/id?1015168 - () http://securitytracker.com/id?1015168 -
References () http://support.avaya.com/elmodocs2/security/ASA-2005-228.pdf - () http://support.avaya.com/elmodocs2/security/ASA-2005-228.pdf -
References () http://www.eeye.com/html/research/advisories/AD20051108b.html - Patch, Vendor Advisory () http://www.eeye.com/html/research/advisories/AD20051108b.html - Patch, Vendor Advisory
References () http://www.kb.cert.org/vuls/id/300549 - Patch, Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/300549 - Patch, Third Party Advisory, US Government Resource
References () http://www.securityfocus.com/bid/15352 - () http://www.securityfocus.com/bid/15352 -
References () http://www.us-cert.gov/cas/techalerts/TA05-312A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA05-312A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2005/2348 - () http://www.vupen.com/english/advisories/2005/2348 -
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-053 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-053 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1063 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1063 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1175 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1175 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1263 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1263 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1546 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1546 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A701 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A701 -

Information

Published : 2005-11-29 21:03

Updated : 2024-11-20 23:58


NVD link : CVE-2005-2123

Mitre link : CVE-2005-2123

CVE.ORG link : CVE-2005-2123


JSON object : View

Products Affected

microsoft

  • windows_2003_server
  • windows_xp
  • windows_2000