Vulnerability Details : CVE-2005-1983
Public exploit exists!
Stack-based buffer overflow in the Plug and Play (PnP) service for Microsoft Windows 2000 and Windows XP Service Pack 1 allows remote attackers to execute arbitrary code via a crafted packet, and local users to gain privileges via a malicious application, as exploited by the Zotob (aka Mytob) worm.
Vulnerability category: OverflowExecute code
Products affected by CVE-2005-1983
- cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-1983
97.50%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2005-1983
-
MS05-039 Microsoft Plug and Play Service Overflow
Disclosure Date: 2005-08-09First seen: 2020-04-26exploit/windows/smb/ms05_039_pnpThis module exploits a stack buffer overflow in the Windows Plug and Play service. This vulnerability can be exploited on Windows 2000 without a valid user account. NOTE: Since the PnP service runs inside the service.exe process, a failed exploit attempt w
CVSS scores for CVE-2005-1983
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2005-1983
-
http://www.hsc.fr/ressources/presentations/null_sessions/
-
http://www.frsirt.com/english/alerts/20050814.ZotobA.php
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A474
-
http://archives.neohapsis.com/archives/fulldisclosure/2005-08/0384.html
-
http://www.kb.cert.org/vuls/id/998653
US Government Resource
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/21602
-
http://www.us-cert.gov/cas/techalerts/TA05-221A.html
Patch;US Government Resource
-
http://www.ciac.org/ciac/bulletins/p-266.shtml
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A497
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100073
-
http://xforce.iss.net/xforce/alerts/id/202
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A160
-
http://securitytracker.com/id?1014640
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A267
-
http://www.vupen.com/english/advisories/2005/1354
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-039
-
http://www.securiteam.com/windowsntfocus/5YP0E00GKW.html
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A783
-
http://www.securityfocus.com/bid/14513
Microsoft Windows Plug and Play Buffer Overflow Vulnerability
Jump to