CVE-2005-2124
Microsoft Windows Metafile - 'mtNoObjects' Denial of Service (MS05-053)
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
Unspecified vulnerability in the Graphics Rendering Engine (GDI32.DLL) in Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1, related to "An unchecked buffer" and possibly buffer overflows, allows remote attackers to execute arbitrary code via a crafted Windows Metafile (WMF) format image, aka "Windows Metafile Vulnerability."
eEye Digital Security has discovered a heap overflow vulnerability in the way the Windows Graphical Device Interface (GDI) processes Windows enhanced metafile images (file extensions EMF and WMF). An attacker could send a malicious metafile to a victim of his choice over any of a variety of media -- such as HTML e-mail, a link to a web page, a metafile-bearing Microsoft Office document, or a chat message -- in order to execute code on that user's system at the user's privilege level.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2005-07-02 CVE Reserved
- 2005-11-09 CVE Published
- 2005-11-29 First Exploit
- 2024-08-07 CVE Updated
- 2025-07-25 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (15)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/17223 | Third Party Advisory | |
http://secunia.com/advisories/17461 | Third Party Advisory | |
http://secunia.com/advisories/17498 | Third Party Advisory | |
http://securityreason.com/securityalert/161 | Third Party Advisory | |
http://securitytracker.com/id?1015168 | Vdb Entry | |
http://support.avaya.com/elmodocs2/security/ASA-2005-228.pdf | X_refsource_confirm | |
http://www.eeye.com/html/research/advisories/AD20051108a.html | X_refsource_misc | |
http://www.securityfocus.com/bid/15356 | Vdb Entry | |
http://www.us-cert.gov/cas/techalerts/TA05-312A.html | Third Party Advisory | |
http://www.vupen.com/english/advisories/2005/2348 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/1346 | 2005-11-30 | |
https://www.exploit-db.com/exploits/1343 | 2005-11-29 |
URL | Date | SRC |
---|---|---|
http://www.eeye.com/html/research/advisories/AD20051108b.html | 2018-10-12 | |
http://www.kb.cert.org/vuls/id/433341 | 2018-10-12 |
URL | Date | SRC |
---|---|---|
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-053 | 2018-10-12 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Microsoft Search vendor "Microsoft" | Windows 2000 Search vendor "Microsoft" for product "Windows 2000" | * | sp4, fr |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows 2003 Server Search vendor "Microsoft" for product "Windows 2003 Server" | 64-bit Search vendor "Microsoft" for product "Windows 2003 Server" and version "64-bit" | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows 2003 Server Search vendor "Microsoft" for product "Windows 2003 Server" | itanium Search vendor "Microsoft" for product "Windows 2003 Server" and version "itanium" | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows 2003 Server Search vendor "Microsoft" for product "Windows 2003 Server" | r2 Search vendor "Microsoft" for product "Windows 2003 Server" and version "r2" | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows 2003 Server Search vendor "Microsoft" for product "Windows 2003 Server" | sp1 Search vendor "Microsoft" for product "Windows 2003 Server" and version "sp1" | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows 2003 Server Search vendor "Microsoft" for product "Windows 2003 Server" | sp1 Search vendor "Microsoft" for product "Windows 2003 Server" and version "sp1" | itanium |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Xp Search vendor "Microsoft" for product "Windows Xp" | * | 64-bit |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Xp Search vendor "Microsoft" for product "Windows Xp" | * | sp1, tablet_pc |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Xp Search vendor "Microsoft" for product "Windows Xp" | * | sp2, tablet_pc |
Affected
|