Lucene search

K
saintSAINT CorporationSAINT:5FF736F5EAC824BEFB3C534FCFA9B449
HistoryMar 03, 2006 - 12:00 a.m.

Windows Plug and Play buffer overflow

2006-03-0300:00:00
SAINT Corporation
my.saintcorporation.com
17

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.975 High

EPSS

Percentile

100.0%

Added: 03/03/2006
CVE: CVE-2005-1983
BID: 14513
OSVDB: 18605

Background

The Windows Plug and Play service allows Windows operating systems to automatically detect and configure a new hardware device, such as a mouse.

Problem

A buffer overflow in the Plug and Play service could allow command execution with administrative privileges.

Resolution

Apply the patch referenced in Microsoft Security Bulletin 05-047.

References

<http://www.microsoft.com/technet/security/bulletin/MS05-039.mspx&gt;

Limitations

Remote, uncredentialed command execution is not possible on Windows XP or Windows Server 2003.

Successful exploitation may cause the target to reboot after disconnection.

Platforms

Windows

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.975 High

EPSS

Percentile

100.0%