Vulnerabilities > CVE-2005-1206 - Unspecified vulnerability in Microsoft Windows 2000, Windows 2003 Server and Windows XP
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN microsoft
nessus
Summary
Buffer overflow in the Server Message Block (SMB) functionality for Microsoft Windows 2000, XP SP1 and SP2, and Server 2003 and SP1 allows remote attackers to execute arbitrary code via unknown vectors, aka the "Server Message Block Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 5 |
Nessus
NASL family Windows : Microsoft Bulletins NASL id SMB_NT_MS05-027.NASL description The remote version of Windows contains a flaw in the Server Message Block (SMB) implementation that could allow an attacker to execute arbitrary code on the remote host. An attacker does not need to be authenticated to exploit this flaw. last seen 2020-06-01 modified 2020-06-02 plugin id 18483 published 2005-06-14 reporter This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/18483 title MS05-027: Vulnerability in SMB Could Allow Remote Code Execution (896422) NASL family Windows NASL id SMB_KB896422.NASL description The remote version of Windows contains a flaw in the Server Message Block (SMB) implementation that may allow an attacker to execute arbitrary code on the remote host. An attacker does not need to be authenticated to exploit this flaw. last seen 2020-06-01 modified 2020-06-02 plugin id 18502 published 2005-06-16 reporter This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/18502 title MS05-027: Vulnerability in SMB Could Allow Remote Code Execution (896422) (uncredentialed check)
Oval
accepted 2011-05-16T04:00:23.855-04:00 class vulnerability contributors name Jonathan Baker organization The MITRE Corporation name Jonathan Baker organization The MITRE Corporation name Dragos Prisaca organization Gideon Technologies, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description Buffer overflow in the Server Message Block (SMB) functionality for Microsoft Windows 2000, XP SP1 and SP2, and Server 2003 and SP1 allows remote attackers to execute arbitrary code via unknown vectors, aka the "Server Message Block Vulnerability." family windows id oval:org.mitre.oval:def:1142 status accepted submitted 2005-06-22T12:00:00.000-04:00 title Windows XP Unknown Vector SMB Vulnerability version 42 accepted 2011-05-16T04:02:33.423-04:00 class vulnerability contributors name Jonathan Baker organization The MITRE Corporation name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description Buffer overflow in the Server Message Block (SMB) functionality for Microsoft Windows 2000, XP SP1 and SP2, and Server 2003 and SP1 allows remote attackers to execute arbitrary code via unknown vectors, aka the "Server Message Block Vulnerability." family windows id oval:org.mitre.oval:def:259 status accepted submitted 2005-06-22T12:00:00.000-04:00 title Server 2003 Unknown Vector SMB Vulnerability version 40 accepted 2011-05-16T04:03:02.582-04:00 class vulnerability contributors name Jonathan Baker organization The MITRE Corporation name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description Buffer overflow in the Server Message Block (SMB) functionality for Microsoft Windows 2000, XP SP1 and SP2, and Server 2003 and SP1 allows remote attackers to execute arbitrary code via unknown vectors, aka the "Server Message Block Vulnerability." family windows id oval:org.mitre.oval:def:467 status accepted submitted 2005-06-22T12:00:00.000-04:00 title Windows 2000 Unknown Vector SMB Vulnerability version 41
References
- http://www.us-cert.gov/cas/techalerts/TA05-165A.html
- http://www.kb.cert.org/vuls/id/489397
- http://secunia.com/advisories/15694
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A467
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A259
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1142
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-027