Stack-based buffer overflow in the Plug and Play (PnP) service (UMPNPMGR.DLL) in Microsoft Windows 2000 SP4, and XP SP1 and SP2, allows remote or local authenticated attackers to execute arbitrary code via a large number of "\" (backslash) characters in a registry key name, which triggers the overflow in a wsprintfW function call.
Published 2005-10-13 10:02:00
Updated 2018-10-12 21:37:06
View at NVD,   CVE.org
Vulnerability category: OverflowExecute code

Products affected by CVE-2005-2120

Exploit prediction scoring system (EPSS) score for CVE-2005-2120

13.15%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 96 %
Percentile, the proportion of vulnerabilities that are scored at or less

Metasploit modules for CVE-2005-2120

  • Microsoft Plug and Play Service Registry Overflow
    First seen: 2020-04-26
    auxiliary/dos/windows/smb/ms05_047_pnp
    This module triggers a stack buffer overflow in the Windows Plug and Play service. This vulnerability can be exploited on Windows 2000 without a valid user account. Since the PnP service runs inside the service.exe process, this module will result in a forc

CVSS scores for CVE-2005-2120

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
6.5
MEDIUM AV:N/AC:L/Au:S/C:P/I:P/A:P
8.0
6.4
NIST
Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!