CVE-2005-2120
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
13/10/2005
Last modified:
03/04/2025
Description
Stack-based buffer overflow in the Plug and Play (PnP) service (UMPNPMGR.DLL) in Microsoft Windows 2000 SP4, and XP SP1 and SP2, allows remote or local authenticated attackers to execute arbitrary code via a large number of "\" (backslash) characters in a registry key name, which triggers the overflow in a wsprintfW function call.
Impact
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/17166
- http://secunia.com/advisories/17172
- http://secunia.com/advisories/17223
- http://securityreason.com/securityalert/71
- http://securitytracker.com/id?1015042=
- http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf
- http://www.eeye.com/html/research/advisories/AD20051011c.html
- http://www.kb.cert.org/vuls/id/214572
- http://www.osvdb.org/18830
- http://www.securityfocus.com/bid/15065
- http://www.us-cert.gov/cas/techalerts/TA05-284A.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-047
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1244
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1328
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1519
- http://secunia.com/advisories/17166
- http://secunia.com/advisories/17172
- http://secunia.com/advisories/17223
- http://securityreason.com/securityalert/71
- http://securitytracker.com/id?1015042=
- http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf
- http://www.eeye.com/html/research/advisories/AD20051011c.html
- http://www.kb.cert.org/vuls/id/214572
- http://www.osvdb.org/18830
- http://www.securityfocus.com/bid/15065
- http://www.us-cert.gov/cas/techalerts/TA05-284A.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-047
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1244
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1328
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1519



