Vulnerabilities > CVE-2005-2123 - Unspecified vulnerability in Microsoft Windows 2000, Windows 2003 Server and Windows XP
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Multiple integer overflows in the Graphics Rendering Engine (GDI32.DLL) in Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allow remote attackers to execute arbitrary code via crafted Windows Metafile (WMF) and Enhanced Metafile (EMF) format images that lead to heap-based buffer overflows, as demonstrated using MRBP16::bCheckRecord.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 9 |
Exploit-Db
description | MS Windows Metafile (mtNoObjects) Denial of Service Exploit (MS05-053). CVE-2005-0803,CVE-2005-2123,CVE-2005-2124. Dos exploit for windows platform |
id | EDB-ID:1346 |
last seen | 2016-01-31 |
modified | 2005-11-30 |
published | 2005-11-30 |
reporter | Winny Thomas |
source | https://www.exploit-db.com/download/1346/ |
title | Microsoft Windows Metafile - mtNoObjects Denial of Service Exploit MS05-053 |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS05-053.NASL |
description | The remote host contains a version of Microsoft Windows missing a critical security update to fix several vulnerabilities in the Graphic Rendering Engine, and in the way Windows handles Metafiles. An attacker could exploit these flaws to execute arbitrary code on the remote host by sending a specially crafted Windows Metafile (WMF) or Enhanced Metafile (EMF) to a victim on the remote host. When viewing the malformed file, a buffer overflow condition occurs that may allow the execution of arbitrary code with the privileges of the user. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 20172 |
published | 2005-11-08 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/20172 |
title | MS05-053: Vulnerabilities in Graphics Rendering Engine Could Allow Code Execution (896424) |
code |
|
Oval
accepted 2011-05-16T04:00:15.176-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Anna Min organization BigFix, Inc name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description Multiple integer overflows in the Graphics Rendering Engine (GDI32.DLL) in Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allow remote attackers to execute arbitrary code via crafted Windows Metafile (WMF) and Enhanced Metafile (EMF) format images that lead to heap-based buffer overflows, as demonstrated using MRBP16::bCheckRecord. family windows id oval:org.mitre.oval:def:1063 status accepted submitted 2005-11-09T12:00:00.000-04:00 title WMF Rendering Code Execution Vulnerability (Windows 2000) version 70 accepted 2011-05-16T04:00:27.415-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Dragos Prisaca organization Gideon Technologies, Inc. name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description Multiple integer overflows in the Graphics Rendering Engine (GDI32.DLL) in Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allow remote attackers to execute arbitrary code via crafted Windows Metafile (WMF) and Enhanced Metafile (EMF) format images that lead to heap-based buffer overflows, as demonstrated using MRBP16::bCheckRecord. family windows id oval:org.mitre.oval:def:1175 status accepted submitted 2005-11-09T12:00:00.000-04:00 title WMF Rendering Code Execution Vulnerability (32-bit Windows XP,SP2) version 70 accepted 2011-05-16T04:00:43.924-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Jonathan Baker organization The MITRE Corporation name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description Multiple integer overflows in the Graphics Rendering Engine (GDI32.DLL) in Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allow remote attackers to execute arbitrary code via crafted Windows Metafile (WMF) and Enhanced Metafile (EMF) format images that lead to heap-based buffer overflows, as demonstrated using MRBP16::bCheckRecord. family windows id oval:org.mitre.oval:def:1263 status accepted submitted 2005-11-09T12:00:00.000-04:00 title WMF Rendering Code Execution Vulnerability (64-bit Windows XP and Server 2003,Unpatched) version 70 accepted 2011-05-16T04:01:17.604-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Mike Lah organization The MITRE Corporation name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description Multiple integer overflows in the Graphics Rendering Engine (GDI32.DLL) in Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allow remote attackers to execute arbitrary code via crafted Windows Metafile (WMF) and Enhanced Metafile (EMF) format images that lead to heap-based buffer overflows, as demonstrated using MRBP16::bCheckRecord. family windows id oval:org.mitre.oval:def:1546 status accepted submitted 2005-11-09T12:00:00.000-04:00 title WMF Rendering Code Execution Vulnerability (32-bit Windows XP,SP1) version 70 accepted 2011-05-16T04:03:22.258-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description Multiple integer overflows in the Graphics Rendering Engine (GDI32.DLL) in Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allow remote attackers to execute arbitrary code via crafted Windows Metafile (WMF) and Enhanced Metafile (EMF) format images that lead to heap-based buffer overflows, as demonstrated using MRBP16::bCheckRecord. family windows id oval:org.mitre.oval:def:701 status accepted submitted 2005-11-09T12:00:00.000-04:00 title WMF Rendering Code Execution Vulnerability (64-bit Windows XP and Server 2003,SP1) version 69
References
- http://www.eeye.com/html/research/advisories/AD20051108b.html
- http://www.kb.cert.org/vuls/id/300549
- http://www.securityfocus.com/bid/15352
- http://securitytracker.com/id?1015168
- http://secunia.com/advisories/17498
- http://support.avaya.com/elmodocs2/security/ASA-2005-228.pdf
- http://secunia.com/advisories/17461
- http://secunia.com/advisories/17223
- http://www.us-cert.gov/cas/techalerts/TA05-312A.html
- http://www.vupen.com/english/advisories/2005/2348
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A701
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1546
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1263
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1175
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1063
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-053