CVE-2005-3171
https://notcve.org/view.php?id=CVE-2005-3171
Microsoft Windows 2000 before Update Rollup 1 for SP4 records Event ID 1704 to indicate that Group Policy security settings were successfully updated, even when the processing fails such as when Ntuser.pol cannot be accessed, which could cause system administrators to believe that the system is compliant with the specified settings. • http://support.microsoft.com/kb/884559 http://support.microsoft.com/kb/900345 •
CVE-2005-3174
https://notcve.org/view.php?id=CVE-2005-3174
Microsoft Windows 2000 before Update Rollup 1 for SP4 allows users to log on to the domain, even when their password has expired, if the fully qualified domain name (FQDN) is 8 characters long. • http://support.microsoft.com/kb/830847 http://support.microsoft.com/kb/900345 •
CVE-2005-3172
https://notcve.org/view.php?id=CVE-2005-3172
The WideCharToMultiByte function in Microsoft Windows 2000 before Update Rollup 1 for SP4 does not properly convert strings with Japanese composite characters in the last character, which could prevent the string from being null terminated and lead to data corruption or enable buffer overflow attacks. • http://support.microsoft.com/kb/824867 http://support.microsoft.com/kb/900345 •
CVE-2005-3175
https://notcve.org/view.php?id=CVE-2005-3175
Microsoft Windows 2000 before Update Rollup 1 for SP4 allows a local administrator to unlock a computer even if it has been locked by a domain administrator, which allows the local administrator to access the session as the domain administrator. • http://support.microsoft.com/kb/842742 http://support.microsoft.com/kb/900345 •
CVE-2005-1984
https://notcve.org/view.php?id=CVE-2005-1984
Buffer overflow in the Print Spooler service (Spoolsv.exe) for Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code via a malicious message. • http://secunia.com/advisories/16356 http://securitytracker.com/id?1014638 http://www.kb.cert.org/vuls/id/220821 http://www.securityfocus.com/bid/14514 http://www.us-cert.gov/cas/techalerts/TA05-221A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-043 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100077 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1045 https://oval.cisec •