Vulnerabilities > CVE-2005-0060 - Unspecified vulnerability in Microsoft products
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Buffer overflow in the font processing component of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via a specially-designed application.
Vulnerable Configurations
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS05-018.NASL |
description | The remote host contains a version of the Windows kernel that is vulnerable to a security flaw that could allow a local user to elevate his privileges or to crash the remote host (therefore causing a denial of service). |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 18022 |
published | 2005-04-12 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/18022 |
title | MS05-018: Vulnerabilities in Windows Kernel (890859) |
code |
|
Oval
accepted 2011-05-16T04:02:32.900-04:00 class vulnerability contributors name Ingrid Skoog organization The MITRE Corporation name Christine Walzer organization The MITRE Corporation name Andrew Buttner organization The MITRE Corporation name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description Buffer overflow in the font processing component of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via a specially-designed application. family windows id oval:org.mitre.oval:def:2562 status accepted submitted 2005-05-02T12:00:00.000-04:00 title Windows 2000 Font Buffer Overflow version 69 accepted 2005-06-22T12:38:00.000-04:00 class vulnerability contributors name Ingrid Skoog organization The MITRE Corporation name Christine Walzer organization The MITRE Corporation
description Buffer overflow in the font processing component of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via a specially-designed application. family windows id oval:org.mitre.oval:def:2731 status accepted submitted 2005-05-02T12:00:00.000-04:00 title Server 2003 Font Buffer Overflow version 64 accepted 2011-05-16T04:02:55.321-04:00 class vulnerability contributors name Ingrid Skoog organization The MITRE Corporation name Christine Walzer organization The MITRE Corporation name Jeff Ito organization Secure Elements, Inc. name Dragos Prisaca organization Gideon Technologies, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description Buffer overflow in the font processing component of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via a specially-designed application. family windows id oval:org.mitre.oval:def:3941 status accepted submitted 2005-05-02T12:00:00.000-04:00 title Windows XP Font Buffer Overflow (SP2) version 72 accepted 2011-05-16T04:03:04.946-04:00 class vulnerability contributors name Ingrid Skoog organization The MITRE Corporation name Christine Walzer organization The MITRE Corporation name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description Buffer overflow in the font processing component of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via a specially-designed application. family windows id oval:org.mitre.oval:def:4797 status accepted submitted 2005-05-02T12:00:00.000-04:00 title Windows XP Font Buffer Overflow (SP1) version 70
References
- http://marc.info/?l=bugtraq&m=111343529426926&w=2
- http://www.ngssoftware.com/advisories/ms-01.txt
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-018
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2562
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2731
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3941
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4797