CVE-2005-2120
Microsoft Windows Plug-and-Play - 'Umpnpmgr.dll' Denial of Service (MS05-047)
Severity Score
6.5
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
3
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Stack-based buffer overflow in the Plug and Play (PnP) service (UMPNPMGR.DLL) in Microsoft Windows 2000 SP4, and XP SP1 and SP2, allows remote or local authenticated attackers to execute arbitrary code via a large number of "\" (backslash) characters in a registry key name, which triggers the overflow in a wsprintfW function call.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2005-07-02 CVE Reserved
- 2005-10-12 CVE Published
- 2005-10-21 First Exploit
- 2024-08-07 CVE Updated
- 2024-09-19 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (17)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/17172 | Third Party Advisory | |
http://secunia.com/advisories/17223 | Third Party Advisory | |
http://securityreason.com/securityalert/71 | Third Party Advisory | |
http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf | X_refsource_confirm | |
http://www.kb.cert.org/vuls/id/214572 | Third Party Advisory | |
http://www.osvdb.org/18830 | Vdb Entry | |
http://www.us-cert.gov/cas/techalerts/TA05-284A.html | Third Party Advisory | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1244 | Signature | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1328 | Signature | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1519 | Signature |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/1269 | 2005-10-21 | |
https://www.exploit-db.com/exploits/1271 | 2005-10-24 | |
http://www.securityfocus.com/bid/15065 | 2024-08-07 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/17166 | 2018-10-12 | |
http://securitytracker.com/id?1015042 | 2018-10-12 | |
http://www.eeye.com/html/research/advisories/AD20051011c.html | 2018-10-12 |
URL | Date | SRC |
---|---|---|
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-047 | 2018-10-12 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Microsoft Search vendor "Microsoft" | Windows 2000 Search vendor "Microsoft" for product "Windows 2000" | * | sp4, fr |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Xp Search vendor "Microsoft" for product "Windows Xp" | * | sp1, tablet_pc |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Xp Search vendor "Microsoft" for product "Windows Xp" | * | sp2, tablet_pc |
Affected
|