CVE-2005-2119 – Microsoft Windows - MSDTC Service Remote Memory Modification (PoC) (MS05-051)
https://notcve.org/view.php?id=CVE-2005-2119
The MIDL_user_allocate function in the Microsoft Distributed Transaction Coordinator (MSDTC) proxy (MSDTCPRX.DLL) allocates a 4K page of memory regardless of the required size, which allows attackers to overwrite arbitrary memory locations using an incorrect size value that is provided to the NdrAllocate function, which writes management data to memory outside of the allocated buffer. • https://www.exploit-db.com/exploits/1341 https://www.exploit-db.com/exploits/1352 http://secunia.com/advisories/17161 http://secunia.com/advisories/17172 http://secunia.com/advisories/17223 http://secunia.com/advisories/17509 http://securityreason.com/securityalert/73 http://securitytracker.com/id?1015037 http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf http://www.eeye.com/html/research/advisories/AD20051011b.html http://www.kb.cert.org/vuls/id/180868 http: •
CVE-2005-2765
https://notcve.org/view.php?id=CVE-2005-2765
The user interface in the Windows Firewall does not properly display certain malformed entries in the Windows Registry, which makes it easier for attackers with administrator privileges to hide activities if the administrator only uses the Windows Firewall interface to monitor exceptions. NOTE: the vendor disputes this issue, saying that since administrative privileges are already required, it is not a vulnerability. CVE has not yet formally decided if such "information hiding" issues should be included. • http://www.microsoft.com/technet/security/advisory/897663.mspx •
CVE-2005-1218 – Microsoft Windows XP SP2 - 'rdpwd.sys' Remote Kernel Denial of Service
https://notcve.org/view.php?id=CVE-2005-1218
The Microsoft Windows kernel in Microsoft Windows 2000 Server, Windows XP, and Windows Server 2003 allows remote attackers to cause a denial of service (crash) via crafted Remote Desktop Protocol (RDP) requests. • https://www.exploit-db.com/exploits/1143 http://marc.info/?l=bugtraq&m=112146383919436&w=2 http://security-protocols.com/modules.php?name=News&file=article&sid=2783 http://www.kb.cert.org/vuls/id/490628 http://www.microsoft.com/technet/security/advisory/904797.mspx http://www.securityfocus.com/bid/14259 http://www.us-cert.gov/cas/techalerts/TA05-221A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-041 https://oval.cisecurity.org/reposito •
CVE-2005-2388
https://notcve.org/view.php?id=CVE-2005-2388
Buffer overflow in a certain USB driver, as used on Microsoft Windows, allows attackers to execute arbitrary code. Desbordamiento de búfer en cierto driver USB, usado en Windows, permite que atacantes ejecuten código arbitrario. • http://secunia.com/advisories/16210 http://securitytracker.com/id?1014566 http://www.eweek.com/article2/0%2C1759%2C1840131%2C00.asp http://www.osvdb.org/18493 http://www.securityfocus.com/bid/14376 https://exchange.xforce.ibmcloud.com/vulnerabilities/21539 •
CVE-2005-1214
https://notcve.org/view.php?id=CVE-2005-1214
Microsoft Agent allows remote attackers to spoof trusted Internet content and execute arbitrary code by disguising security prompts on a malicious Web page. Microsoft Agent permite a los atacantes remotos falsificar contenido de Internet de confianza y ejecutar código arbitrario disfrazando las indicaciones de seguridad en una página web maliciosa. • http://secunia.com/advisories/15689 http://www.securityfocus.com/bid/13948 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-032 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1194 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A682 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A906 •