MS-RPC: Microsoft Windows Invalid Plug And Play Service

This signature detects attempts to exploit a known vulnerability against Microsoft Windows Plug And Play Service RPC Interface. A successful attack can lead to arbitrary code execution.

Extended Description

Stack-based buffer overflow in the Plug and Play (PnP) service (UMPNPMGR.DLL) in Microsoft Windows 2000 SP4, and XP SP1 and SP2, allows remote or local authenticated attackers to execute arbitrary code via a large number of "\" (backslash) characters in a registry key name, which triggers the overflow in a wsprintfW function call.

Affected Products

Microsoft windows_2000

References

BugTraq: 15065

CVE: CVE-2005-2120

Short Name
MS-RPC:INV:PNP-SVC
Severity
Major
Recommended
False
Recommended Action
Drop
Category
MS-RPC
Keywords
And CVE-2005-2120 Invalid Microsoft Play Plug Service Windows bid:15065
Release Date
04/22/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3761
False Positive
Unknown
Vendors

Microsoft

CVSS Score

6.5

Found a potential security threat?