Vulnerabilities > CVE-2005-2118 - Unspecified vulnerability in Microsoft Windows 2000, Windows 2003 Server and Windows XP
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN microsoft
nessus
Summary
Windows Shell for Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 allows remote user-assisted attackers to execute arbitrary commands via a crafted shortcut (.lnk) file with long font properties that lead to a buffer overflow when the user views the file's properties using Windows Explorer, a different vulnerability than CVE-2005-2122.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 12 |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS05-049.NASL |
description | The remote version of Windows contains a version of the Windows Shell that has several vulnerabilities. An attacker may exploit these vulnerabilities by : - Sending a malformed .lnk file a to user on the remote host to trigger an overflow. - Sending a malformed HTML document to a user on the remote host and have him view it in the Windows Explorer preview pane. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 20002 |
published | 2005-10-11 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/20002 |
title | MS05-049: Vulnerabilities in Windows Shell Could Allow Remote Code Execution (900725) |
code |
|
Oval
accepted 2011-05-16T04:00:20.137-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description Windows Shell for Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 allows remote user-assisted attackers to execute arbitrary commands via a crafted shortcut (.lnk) file with long font properties that lead to a buffer overflow when the user views the file's properties using Windows Explorer, a different vulnerability than CVE-2005-2122. family windows id oval:org.mitre.oval:def:1116 status accepted submitted 2005-10-12T12:00:00.000-04:00 title .lnk File-Properties Remote Code Execution Vulnerability (Windows XP) version 68 accepted 2011-05-16T04:00:30.541-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name John Hoyland organization Centennial Software name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description Windows Shell for Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 allows remote user-assisted attackers to execute arbitrary commands via a crafted shortcut (.lnk) file with long font properties that lead to a buffer overflow when the user views the file's properties using Windows Explorer, a different vulnerability than CVE-2005-2122. family windows id oval:org.mitre.oval:def:1192 status accepted submitted 2005-10-12T12:00:00.000-04:00 title .lnk File-Properties Remote Code Execution Vulnerability (Windows 2000) version 69
References
- http://www.argeniss.com/research/MSBugPaper.pdf
- http://www.us-cert.gov/cas/techalerts/TA05-284A.html
- http://www.securityfocus.com/bid/15070
- http://securitytracker.com/id?1015040
- http://secunia.com/advisories/17168
- http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf
- http://secunia.com/advisories/17172
- http://secunia.com/advisories/17223
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1192
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1116
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-049