CVE-2005-3981 – Microsoft Windows XP/2000/2003 - CreateRemoteThread Local Denial of Service
https://notcve.org/view.php?id=CVE-2005-3981
NOTE: this issue has been disputed by third parties. Microsoft Windows XP, 2000, and 2003 allows local users to kill a writable process by using the CreateRemoteThread function with certain arguments on a process that has been opened using the OpenProcess function, possibly involving an invalid address for the start routine. NOTE: followup posts have disputed this issue, saying that if a user already has privileges to write to a process, then other functions could be called or the process could be terminated using PROCESS_TERMINATE • https://www.exploit-db.com/exploits/26690 http://www.securityfocus.com/archive/1/418289/100/0/threaded http://www.securityfocus.com/archive/1/418431/100/0/threaded http://www.securityfocus.com/bid/15671 •
CVE-2005-3945
https://notcve.org/view.php?id=CVE-2005-3945
The SynAttackProtect protection in Microsoft Windows 2003 before SP1 and Windows 2000 before SP4 with Update Roll-up uses a hash of predictable data, which allows remote attackers to cause a denial of service (CPU consumption) via a flood of SYN packets that produce identical hash values, which slows down the hash table lookups. • http://www.securityfocus.com/archive/1/417952/100/0/threaded http://www.securityfocus.com/bid/15613 •
CVE-2005-2124 – Microsoft Windows Metafile - 'gdi32.dll' Denial of Service (MS05-053)
https://notcve.org/view.php?id=CVE-2005-2124
Unspecified vulnerability in the Graphics Rendering Engine (GDI32.DLL) in Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1, related to "An unchecked buffer" and possibly buffer overflows, allows remote attackers to execute arbitrary code via a crafted Windows Metafile (WMF) format image, aka "Windows Metafile Vulnerability." • https://www.exploit-db.com/exploits/1343 https://www.exploit-db.com/exploits/1346 http://secunia.com/advisories/17223 http://secunia.com/advisories/17461 http://secunia.com/advisories/17498 http://securityreason.com/securityalert/161 http://securitytracker.com/id?1015168 http://support.avaya.com/elmodocs2/security/ASA-2005-228.pdf http://www.eeye.com/html/research/advisories/AD20051108a.html http://www.eeye.com/html/research/advisories/AD20051108b.html http://www.kb.cert.org •
CVE-2005-2123 – Microsoft Windows Metafile - 'mtNoObjects' Denial of Service (MS05-053)
https://notcve.org/view.php?id=CVE-2005-2123
Multiple integer overflows in the Graphics Rendering Engine (GDI32.DLL) in Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allow remote attackers to execute arbitrary code via crafted Windows Metafile (WMF) and Enhanced Metafile (EMF) format images that lead to heap-based buffer overflows, as demonstrated using MRBP16::bCheckRecord. • https://www.exploit-db.com/exploits/1346 http://secunia.com/advisories/17223 http://secunia.com/advisories/17461 http://secunia.com/advisories/17498 http://securitytracker.com/id?1015168 http://support.avaya.com/elmodocs2/security/ASA-2005-228.pdf http://www.eeye.com/html/research/advisories/AD20051108b.html http://www.kb.cert.org/vuls/id/300549 http://www.securityfocus.com/bid/15352 http://www.us-cert.gov/cas/techalerts/TA05-312A.html http://www.vupen.com/english& •
CVE-2005-2118
https://notcve.org/view.php?id=CVE-2005-2118
Windows Shell for Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 allows remote user-assisted attackers to execute arbitrary commands via a crafted shortcut (.lnk) file with long font properties that lead to a buffer overflow when the user views the file's properties using Windows Explorer, a different vulnerability than CVE-2005-2122. • http://secunia.com/advisories/17168 http://secunia.com/advisories/17172 http://secunia.com/advisories/17223 http://securitytracker.com/id?1015040 http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf http://www.argeniss.com/research/MSBugPaper.pdf http://www.securityfocus.com/bid/15070 http://www.us-cert.gov/cas/techalerts/TA05-284A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-049 https://oval.cisecurity.org/repository/search/definition/ •