Vulnerabilities > CVE-2005-1218 - Unspecified vulnerability in Microsoft Windows 2000, Windows 2003 Server and Windows XP
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The Microsoft Windows kernel in Microsoft Windows 2000 Server, Windows XP, and Windows Server 2003 allows remote attackers to cause a denial of service (crash) via crafted Remote Desktop Protocol (RDP) requests.
Vulnerable Configurations
Exploit-Db
description | MS Windows XP SP2 (rdpwd.sys) Remote Kernel DoS Exploit. CVE-2005-1218,CVE-2005-2303. Dos exploit for windows platform |
id | EDB-ID:1143 |
last seen | 2016-01-31 |
modified | 2005-08-09 |
published | 2005-08-09 |
reporter | Tom Ferris |
source | https://www.exploit-db.com/download/1143/ |
title | Microsoft Windows XP SP2 rdpwd.sys Remote Kernel DoS Exploit |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS05-041.NASL |
description | The remote host contains a version of the Remote Desktop protocol/service that is vulnerable to a security flaw that could allow an attacker to crash the remote service and cause the system to stop responding. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 19404 |
published | 2005-08-09 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/19404 |
title | MS05-041: Vulnerability in Remote Desktop Protocol Could Allow Denial of Service (899591) |
code |
|
Oval
accepted 2011-05-16T04:00:05.190-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description The Microsoft Windows kernel in Microsoft Windows 2000 Server, Windows XP, and Windows Server 2003 allows remote attackers to cause a denial of service (crash) via crafted Remote Desktop Protocol (RDP) requests. family windows id oval:org.mitre.oval:def:100092 status accepted submitted 2005-08-16T12:00:00.000-04:00 title Windows XP,SP1 (64-bit) RDP DoS Vulnerability version 39 accepted 2016-02-19T10:00:00.000-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Shane Shaffer organization G2, Inc. name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc. name Maria Mikhno organization ALTX-SOFT
description The Microsoft Windows kernel in Microsoft Windows 2000 Server, Windows XP, and Windows Server 2003 allows remote attackers to cause a denial of service (crash) via crafted Remote Desktop Protocol (RDP) requests. family windows id oval:org.mitre.oval:def:180 status accepted submitted 2006-09-22T05:40:00.000-04:00 title Windows 2000,SP4 Remote Desktop Protocol (RDP) DoS Vulnerability version 43 accepted 2016-02-19T10:00:00.000-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc. name Maria Mikhno organization ALTX-SOFT
description The Microsoft Windows kernel in Microsoft Windows 2000 Server, Windows XP, and Windows Server 2003 allows remote attackers to cause a denial of service (crash) via crafted Remote Desktop Protocol (RDP) requests. family windows id oval:org.mitre.oval:def:346 status accepted submitted 2006-09-22T05:40:00.000-04:00 title Windows Server 2003,SP1 Remote Desktop Protocol (RDP) DoS Vulnerability version 41 accepted 2016-02-19T10:00:00.000-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Robert L. Hollis organization ThreatGuard, Inc. name Dragos Prisaca organization Gideon Technologies, Inc. name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc. name Maria Mikhno organization ALTX-SOFT
description The Microsoft Windows kernel in Microsoft Windows 2000 Server, Windows XP, and Windows Server 2003 allows remote attackers to cause a denial of service (crash) via crafted Remote Desktop Protocol (RDP) requests. family windows id oval:org.mitre.oval:def:376 status accepted submitted 2006-09-22T05:40:00.000-04:00 title Windows XP,SP2 Remote Desktop Protocol (RDP) DoS Vulnerability version 43 accepted 2016-02-19T10:00:00.000-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Jonathan Baker organization The MITRE Corporation name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc. name Maria Mikhno organization ALTX-SOFT
description The Microsoft Windows kernel in Microsoft Windows 2000 Server, Windows XP, and Windows Server 2003 allows remote attackers to cause a denial of service (crash) via crafted Remote Desktop Protocol (RDP) requests. family windows id oval:org.mitre.oval:def:609 status accepted submitted 2006-09-22T05:40:00.000-04:00 title Windows Server 2003 Remote Desktop Protocol (RDP) DoS Vulnerability version 43 accepted 2016-02-19T10:00:00.000-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc. name Maria Mikhno organization ALTX-SOFT
description The Microsoft Windows kernel in Microsoft Windows 2000 Server, Windows XP, and Windows Server 2003 allows remote attackers to cause a denial of service (crash) via crafted Remote Desktop Protocol (RDP) requests. family windows id oval:org.mitre.oval:def:618 status accepted submitted 2006-09-22T05:40:00.000-04:00 title Windows XP,SP1 Remote Desktop Protocol (RDP) DoS Vulnerability version 42
References
- http://security-protocols.com/modules.php?name=News&file=article&sid=2783
- https://www.immunitysec.com/pipermail/dailydave/2005-July/002188.html
- http://www.us-cert.gov/cas/techalerts/TA05-221A.html
- http://www.microsoft.com/technet/security/advisory/904797.mspx
- http://www.securityfocus.com/bid/14259
- http://www.kb.cert.org/vuls/id/490628
- http://marc.info/?l=bugtraq&m=112146383919436&w=2
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A618
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A609
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A376
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A346
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A180
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100092
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-041