Executive Summary

Informations
Name CVE-2005-1980 First vendor Publication 2005-10-12
Vendor Cve Last vendor Modification 2018-10-12

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service hang) via a crafted Transaction Internet Protocol (TIP) message that causes DTC to repeatedly connect to a target IP and port number after an error occurs, aka the "Distributed TIP Vulnerability."

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1980

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:1136
 
Oval ID: oval:org.mitre.oval:def:1136
Title: Distributed TIP Request Validation Process Permits Denial of Service (Server 2003,SP1)
Description: Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service hang) via a crafted Transaction Internet Protocol (TIP) message that causes DTC to repeatedly connect to a target IP and port number after an error occurs, aka the "Distributed TIP Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2005-1980
Version: 4
Platform(s): Microsoft Windows Server 2003
Product(s): TIP
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1182
 
Oval ID: oval:org.mitre.oval:def:1182
Title: Distributed TIP Request Validation Process Permits Denial of Service (XP,SP2)
Description: Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service hang) via a crafted Transaction Internet Protocol (TIP) message that causes DTC to repeatedly connect to a target IP and port number after an error occurs, aka the "Distributed TIP Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2005-1980
Version: 5
Platform(s): Microsoft Windows XP
Product(s): TIP
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1203
 
Oval ID: oval:org.mitre.oval:def:1203
Title: Distributed TIP Request Validation Process Permits Denial of Service (WinXP,SP1)
Description: Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service hang) via a crafted Transaction Internet Protocol (TIP) message that causes DTC to repeatedly connect to a target IP and port number after an error occurs, aka the "Distributed TIP Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2005-1980
Version: 4
Platform(s): Microsoft Windows XP
Product(s): TIP
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1253
 
Oval ID: oval:org.mitre.oval:def:1253
Title: Distributed TIP Request Validation Process Permits Denial of Service (Win2k,SP4)
Description: Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service hang) via a crafted Transaction Internet Protocol (TIP) message that causes DTC to repeatedly connect to a target IP and port number after an error occurs, aka the "Distributed TIP Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2005-1980
Version: 4
Platform(s): Microsoft Windows 2000
Product(s): TIP
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1325
 
Oval ID: oval:org.mitre.oval:def:1325
Title: Distributed TIP Request Validation Process Permits Denial of Service (64-bit XP,SP1)
Description: Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service hang) via a crafted Transaction Internet Protocol (TIP) message that causes DTC to repeatedly connect to a target IP and port number after an error occurs, aka the "Distributed TIP Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2005-1980
Version: 4
Platform(s): Microsoft Windows XP
Product(s): TIP
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1413
 
Oval ID: oval:org.mitre.oval:def:1413
Title: Distributed TIP Request Validation Process Permits Denial of Service (Server 2003)
Description: Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service hang) via a crafted Transaction Internet Protocol (TIP) message that causes DTC to repeatedly connect to a target IP and port number after an error occurs, aka the "Distributed TIP Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2005-1980
Version: 5
Platform(s): Microsoft Windows Server 2003
Product(s): TIP
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 1
Os 5
Os 3

ExploitDB Exploits

id Description
2005-10-11 Microsoft Windows 2000/2003/XP MSDTC TIP Denial Of Service Vulnerability

OpenVAS Exploits

Date Description
2009-11-16 Name : Microsoft RPC Interface Buffer Overrun (KB824146)
File : nvt/msrpc_dcom2.nasl
2005-11-03 Name : Microsoft RPC Interface Buffer Overrun (823980)
File : nvt/msrpc_dcom.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
19904 Microsoft Windows DTC Packet Relay DoS

Microsoft Windows contains a flaw that may allow a remote attacker to cause a denial of service. The issue is due to the Distributed Transaction Controller (MSDTC) not properly handling crafted Transaction Internet Protocol (TIP) message traffic that repeatedly connects after an error occurs. This may cause the service to hang and require a restart by the administrator.

Snort® IPS/IDS

Date Description
2014-01-10 DCERPC DIRECT-UDP msdtc BuildContextW little endian object call overflow attempt
RuleID : 6418 - Revision : 7 - Type : NETBIOS
2014-01-10 DCERPC DIRECT msdtc BuildContextW object call overflow attempt
RuleID : 6417 - Revision : 7 - Type : NETBIOS
2014-01-10 DCERPC DIRECT-UDP msdtc BuildContextW object call overflow attempt
RuleID : 6416 - Revision : 7 - Type : NETBIOS
2014-01-10 DCERPC DIRECT msdtc BuildContextW little endian object call overflow attempt
RuleID : 6415 - Revision : 7 - Type : NETBIOS
2014-01-10 DCERPC DIRECT-UDP v4 msdtc BuildContextW little endian overflow attempt
RuleID : 4252 - Revision : 9 - Type : NETBIOS
2014-01-10 DCERPC DIRECT-UDP msdtc BuildContextW little endian overflow attempt
RuleID : 4251 - Revision : 9 - Type : NETBIOS
2014-01-10 DCERPC DIRECT msdtc BuildContextW overflow attempt
RuleID : 4250 - Revision : 9 - Type : NETBIOS
2014-01-10 DCERPC DIRECT v4 msdtc BuildContextW little endian overflow attempt
RuleID : 4249 - Revision : 7 - Type : NETBIOS
2014-01-10 DCERPC DIRECT-UDP msdtc BuildContextW overflow attempt
RuleID : 4248 - Revision : 9 - Type : NETBIOS
2014-01-10 DCERPC DIRECT v4 msdtc BuildContextW overflow attempt
RuleID : 4247 - Revision : 6 - Type : NETBIOS
2014-01-10 DCERPC NCADG-IP-UDP msdtc BuildContextW overflow attempt
RuleID : 4246 - Revision : 14 - Type : OS-WINDOWS
2014-01-10 DCERPC NCACN-IP-TCP msdtc BuildContextW overflow attempt
RuleID : 4245 - Revision : 14 - Type : OS-WINDOWS

Nessus® Vulnerability Scanner

Date Description
2005-10-12 Name : A vulnerability in MSDTC could allow remote code execution.
File : smb_kb902400.nasl - Type : ACT_GATHER_INFO
2005-10-11 Name : A vulnerability in MSDTC and COM+ could allow remote code execution.
File : smb_nt_ms05-051.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/15059
CONFIRM http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf
IDEFENSE http://www.idefense.com/application/poi/display?id=319&type=vulnerabilities
MS https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05...
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
SECTRACK http://securitytracker.com/id?1015037
SECUNIA http://secunia.com/advisories/17161
http://secunia.com/advisories/17172
http://secunia.com/advisories/17223
http://secunia.com/advisories/17509

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
Date Informations
2021-05-04 12:03:01
  • Multiple Updates
2021-04-22 01:03:17
  • Multiple Updates
2020-05-23 00:16:38
  • Multiple Updates
2018-10-13 00:22:31
  • Multiple Updates
2017-10-11 09:23:31
  • Multiple Updates
2016-04-26 13:36:56
  • Multiple Updates
2014-02-17 10:31:48
  • Multiple Updates
2013-05-11 11:27:38
  • Multiple Updates