Vulnerabilities > CVE-2005-0803 - Resource Management Errors vulnerability in Microsoft Windows 2000
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
PARTIAL Summary
The GetEnhMetaFilePaletteEntries API in GDI32.DLL in Windows 2000 allows remote attackers to cause a denial of service (application crash) via a crafted Enhanced Metafile (EMF) file that causes invalid (1) end, (2) emreof, or (3) palent offsets to be used, aka "Enhanced Metafile Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 5 |
Common Weakness Enumeration (CWE)
Exploit-Db
description MS Windows Metafile (mtNoObjects) Denial of Service Exploit (MS05-053). CVE-2005-0803,CVE-2005-2123,CVE-2005-2124. Dos exploit for windows platform id EDB-ID:1346 last seen 2016-01-31 modified 2005-11-30 published 2005-11-30 reporter Winny Thomas source https://www.exploit-db.com/download/1346/ title Microsoft Windows Metafile - mtNoObjects Denial of Service Exploit MS05-053 description Microsoft Windows 2000/2003/XP Graphical Device Interface Library Denial Of Service Vulnerability. CVE-2005-0803. Dos exploit for windows platform id EDB-ID:25231 last seen 2016-02-03 modified 2005-03-17 published 2005-03-17 reporter Hongzhen Zhou source https://www.exploit-db.com/download/25231/ title Microsoft Windows 2000/2003/XP Graphical Device Interface Library Denial of Service Vulnerability
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS05-053.NASL |
description | The remote host contains a version of Microsoft Windows missing a critical security update to fix several vulnerabilities in the Graphic Rendering Engine, and in the way Windows handles Metafiles. An attacker could exploit these flaws to execute arbitrary code on the remote host by sending a specially crafted Windows Metafile (WMF) or Enhanced Metafile (EMF) to a victim on the remote host. When viewing the malformed file, a buffer overflow condition occurs that may allow the execution of arbitrary code with the privileges of the user. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 20172 |
published | 2005-11-08 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/20172 |
title | MS05-053: Vulnerabilities in Graphics Rendering Engine Could Allow Code Execution (896424) |
code |
|
Oval
accepted 2011-05-16T04:00:20.804-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Dragos Prisaca organization Gideon Technologies, Inc. name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description The GetEnhMetaFilePaletteEntries API in GDI32.DLL in Windows 2000 allows remote attackers to cause a denial of service (application crash) via a crafted Enhanced Metafile (EMF) file that causes invalid (1) end, (2) emreof, or (3) palent offsets to be used, aka "Enhanced Metafile Vulnerability." family windows id oval:org.mitre.oval:def:1121 status accepted submitted 2005-11-09T12:00:00.000-04:00 title EMF Rendering Denial of Service Vulnerability (32-bit Windows XP,SP2) version 70 accepted 2011-05-16T04:00:25.704-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description The GetEnhMetaFilePaletteEntries API in GDI32.DLL in Windows 2000 allows remote attackers to cause a denial of service (application crash) via a crafted Enhanced Metafile (EMF) file that causes invalid (1) end, (2) emreof, or (3) palent offsets to be used, aka "Enhanced Metafile Vulnerability." family windows id oval:org.mitre.oval:def:1152 status accepted submitted 2005-11-09T12:00:00.000-04:00 title EMF Rendering Denial of Service Vulnerability (32-bit Windows XP,SP1) version 69 accepted 2011-05-16T04:00:34.254-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description The GetEnhMetaFilePaletteEntries API in GDI32.DLL in Windows 2000 allows remote attackers to cause a denial of service (application crash) via a crafted Enhanced Metafile (EMF) file that causes invalid (1) end, (2) emreof, or (3) palent offsets to be used, aka "Enhanced Metafile Vulnerability." family windows id oval:org.mitre.oval:def:1215 status accepted submitted 2005-11-09T12:00:00.000-04:00 title EMF Rendering Denial of Service Vulnerability (64-bit Windows XP and Server 2003,SP1) version 69 accepted 2011-05-16T04:00:39.048-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Anna Min organization BigFix, Inc name Mike Lah organization The MITRE Corporation name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description The GetEnhMetaFilePaletteEntries API in GDI32.DLL in Windows 2000 allows remote attackers to cause a denial of service (application crash) via a crafted Enhanced Metafile (EMF) file that causes invalid (1) end, (2) emreof, or (3) palent offsets to be used, aka "Enhanced Metafile Vulnerability." family windows id oval:org.mitre.oval:def:1240 status accepted submitted 2005-11-09T12:00:00.000-04:00 title EMF Rendering Denial of Service Vulnerability (Windows 2000) version 71 accepted 2011-05-16T04:03:19.838-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Jonathan Baker organization The MITRE Corporation name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description The GetEnhMetaFilePaletteEntries API in GDI32.DLL in Windows 2000 allows remote attackers to cause a denial of service (application crash) via a crafted Enhanced Metafile (EMF) file that causes invalid (1) end, (2) emreof, or (3) palent offsets to be used, aka "Enhanced Metafile Vulnerability." family windows id oval:org.mitre.oval:def:671 status accepted submitted 2005-11-09T12:00:00.000-04:00 title EMF Rendering Denial of Service Vulnerability (64-bit Windows XP and Server 2003,Unpatched) version 70
References
- http://marc.info/?l=bugtraq&m=111108743527497&w=2
- http://secunia.com/advisories/14631
- http://secunia.com/advisories/17223
- http://secunia.com/advisories/17461
- http://securitytracker.com/id?1015168
- http://support.avaya.com/elmodocs2/security/ASA-2005-228.pdf
- http://www.kb.cert.org/vuls/id/134756
- http://www.osvdb.org/20580
- http://www.securityfocus.com/bid/12834
- http://www.us-cert.gov/cas/techalerts/TA05-312A.html
- http://www.vupen.com/english/advisories/2005/2348
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-053
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19727
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1121
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1152
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1215
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1240
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A671