SMB: Microsoft Windows Plug and Play Registry Key Access Buffer Overflow

This signature detects attempts to exploit a known vulnerability in Microsoft's Plug and Play protocol. A successful exploit can allow remote code execution and local privilege elevation, leading to an attacker achieving complete control of the affected system.

Extended Description

Stack-based buffer overflow in the Plug and Play (PnP) service (UMPNPMGR.DLL) in Microsoft Windows 2000 SP4, and XP SP1 and SP2, allows remote or local authenticated attackers to execute arbitrary code via a large number of "\" (backslash) characters in a registry key name, which triggers the overflow in a wsprintfW function call.

Affected Products

Microsoft windows_2000

References

BugTraq: 15065 14513

CVE: CVE-2005-2120

Short Name
SMB:OF:RPC-PNP-OF
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
SMB
Keywords
Access Buffer CVE-2005-2120 Key Microsoft Overflow Play Plug Registry Windows and bid:14513 bid:15065
Release Date
10/11/2005
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3761
False Positive
Unknown
Vendors

Microsoft

CVSS Score

6.5

Found a potential security threat?