Vulnerability CVE-2005-2120


Published: 2005-10-13   Modified: 2012-02-12

Description:
Stack-based buffer overflow in the Plug and Play (PnP) service (UMPNPMGR.DLL) in Microsoft Windows 2000 SP4, and XP SP1 and SP2, allows remote or local authenticated attackers to execute arbitrary code via a large number of "\" (backslash) characters in a registry key name, which triggers the overflow in a wsprintfW function call.

See advisories in our WLB2 database:
Topic
Author
Date
High
Windows UMPNPMGR wsprintfW Stack Buffer Overflow Vulnerability
Derek Soeder
12.10.2005

Type:

CWE-Other

CVSS2 => (AV:N/AC:L/Au:S/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.5/10
6.4/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Microsoft -> Windows 2000 
Microsoft -> Windows xp 

 References:
http://securityreason.com/securityalert/71
http://securitytracker.com/id?1015042
http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf
http://www.eeye.com/html/research/advisories/AD20051011c.html
http://www.kb.cert.org/vuls/id/214572
http://www.securityfocus.com/bid/15065
http://www.us-cert.gov/cas/techalerts/TA05-284A.html
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-047
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1244
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1328
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1519

Copyright 2024, cxsecurity.com

 

Back to Top