CVE-2005-4560
Windows XP/2003/Vista Metafile Escape() SetAbortProc Code Execution
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
5Exploited in Wild
-Decision
Descriptions
The Windows Graphical Device Interface library (GDI32.DLL) in Microsoft Windows allows remote attackers to execute arbitrary code via a Windows Metafile (WMF) format image with a crafted SETABORTPROC GDI Escape function call, related to the Windows Picture and Fax Viewer (SHIMGVW.DLL), a different vulnerability than CVE-2005-2123 and CVE-2005-2124, and as originally discovered in the wild on unionseek.com.
Microsoft Windows is vulnerable to remote code execution via an error in handling files using the Windows Metafile image format. Exploit code has been publicly posted and used to successfully attack fully-patched Windows XP SP2 systems. However, other versions of the the Windows operating system may be at risk as well.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2005-12-28 CVE Reserved
- 2005-12-28 CVE Published
- 2009-11-26 First Exploit
- 2024-08-07 CVE Updated
- 2025-07-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-20: Improper Input Validation
CAPEC
References (40)
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/82985 | 2009-11-26 | |
https://www.exploit-db.com/exploits/16612 | 2011-03-10 | |
http://securitytracker.com/id?1015416 | 2024-08-07 | |
http://www.f-secure.com/weblog/archives/archive-122005.html#00000753 | 2024-08-07 | |
http://www.securityfocus.com/bid/16074 | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/18255 | 2018-10-19 | |
http://secunia.com/advisories/18311 | 2018-10-19 | |
http://secunia.com/advisories/18364 | 2018-10-19 | |
http://secunia.com/advisories/18415 | 2018-10-19 | |
http://support.avaya.com/elmodocs2/security/ASA-2006-001.htm | 2018-10-19 | |
http://vil.mcafeesecurity.com/vil/content/v_137760.htm | 2018-10-19 | |
http://www.microsoft.com/technet/security/advisory/912840.mspx | 2018-10-19 | |
http://www.vupen.com/english/advisories/2005/3086 | 2018-10-19 | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-001 | 2018-10-19 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Microsoft Search vendor "Microsoft" | Windows 2003 Server Search vendor "Microsoft" for product "Windows 2003 Server" | enterprise Search vendor "Microsoft" for product "Windows 2003 Server" and version "enterprise" | 64-bit |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows 2003 Server Search vendor "Microsoft" for product "Windows 2003 Server" | enterprise Search vendor "Microsoft" for product "Windows 2003 Server" and version "enterprise" | sp1 |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows 2003 Server Search vendor "Microsoft" for product "Windows 2003 Server" | r2 Search vendor "Microsoft" for product "Windows 2003 Server" and version "r2" | 64-bit |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows 2003 Server Search vendor "Microsoft" for product "Windows 2003 Server" | r2 Search vendor "Microsoft" for product "Windows 2003 Server" and version "r2" | sp1 |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows 2003 Server Search vendor "Microsoft" for product "Windows 2003 Server" | standard Search vendor "Microsoft" for product "Windows 2003 Server" and version "standard" | 64-bit |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows 2003 Server Search vendor "Microsoft" for product "Windows 2003 Server" | standard Search vendor "Microsoft" for product "Windows 2003 Server" and version "standard" | sp1 |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows 2003 Server Search vendor "Microsoft" for product "Windows 2003 Server" | web Search vendor "Microsoft" for product "Windows 2003 Server" and version "web" | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows 2003 Server Search vendor "Microsoft" for product "Windows 2003 Server" | web Search vendor "Microsoft" for product "Windows 2003 Server" and version "web" | sp1 |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Xp Search vendor "Microsoft" for product "Windows Xp" | * | home |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Xp Search vendor "Microsoft" for product "Windows Xp" | * | media_center |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Xp Search vendor "Microsoft" for product "Windows Xp" | * | gold, professional |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Xp Search vendor "Microsoft" for product "Windows Xp" | * | sp1, home |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Xp Search vendor "Microsoft" for product "Windows Xp" | * | sp1, media_center |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Xp Search vendor "Microsoft" for product "Windows Xp" | * | sp2, home |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Xp Search vendor "Microsoft" for product "Windows Xp" | * | sp2, media_center |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Xp Search vendor "Microsoft" for product "Windows Xp" | * | sp2, tablet_pc |
Affected
|