Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2005-1978 | First vendor Publication | 2005-10-12 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
COM+ in Microsoft Windows does not properly "create and use memory structures," which allows local users or remote attackers to execute arbitrary code. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1978 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:1261 | |||
Oval ID: | oval:org.mitre.oval:def:1261 | ||
Title: | COM+ Memory Structures Process Permits Remote Code Execution (64-bit XP,SP1) | ||
Description: | COM+ in Microsoft Windows does not properly "create and use memory structures," which allows local users or remote attackers to execute arbitrary code. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-1978 | Version: | 5 |
Platform(s): | Microsoft Windows XP | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1269 | |||
Oval ID: | oval:org.mitre.oval:def:1269 | ||
Title: | COM+ Memory Structures Process Permits Remote Code Execution (WinXP,SP1) | ||
Description: | COM+ in Microsoft Windows does not properly "create and use memory structures," which allows local users or remote attackers to execute arbitrary code. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-1978 | Version: | 5 |
Platform(s): | Microsoft Windows XP | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1466 | |||
Oval ID: | oval:org.mitre.oval:def:1466 | ||
Title: | COM+ Memory Structures Process Permits Remote Code Execution (Server 2003) | ||
Description: | COM+ in Microsoft Windows does not properly "create and use memory structures," which allows local users or remote attackers to execute arbitrary code. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-1978 | Version: | 6 |
Platform(s): | Microsoft Windows Server 2003 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1499 | |||
Oval ID: | oval:org.mitre.oval:def:1499 | ||
Title: | COM+ Memory Structures Process Permits Remote Code Execution (XP,SP2) | ||
Description: | COM+ in Microsoft Windows does not properly "create and use memory structures," which allows local users or remote attackers to execute arbitrary code. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-1978 | Version: | 6 |
Platform(s): | Microsoft Windows XP | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:576 | |||
Oval ID: | oval:org.mitre.oval:def:576 | ||
Title: | COM+ Memory Structures Process Permits Remote Code Execution (Server 2003,SP1) | ||
Description: | COM+ in Microsoft Windows does not properly "create and use memory structures," which allows local users or remote attackers to execute arbitrary code. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-1978 | Version: | 5 |
Platform(s): | Microsoft Windows Server 2003 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:816 | |||
Oval ID: | oval:org.mitre.oval:def:816 | ||
Title: | COM+ Memory Structures Process Permits Remote Code Execution (Win2k,SP4) | ||
Description: | COM+ in Microsoft Windows does not properly "create and use memory structures," which allows local users or remote attackers to execute arbitrary code. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-1978 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 | |
Os | 5 | |
Os | 3 |
ExploitDB Exploits
id | Description |
---|---|
2005-10-11 | Microsoft Windows 2000/2003/XP MSDTC TIP Denial Of Service Vulnerability |
OpenVAS Exploits
Date | Description |
---|---|
2009-11-16 | Name : Microsoft RPC Interface Buffer Overrun (KB824146) File : nvt/msrpc_dcom2.nasl |
2005-11-03 | Name : Microsoft RPC Interface Buffer Overrun (823980) File : nvt/msrpc_dcom.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
19902 | Microsoft Windows COM+ Remote Code Execution Microsoft Windows contains a flaw that may allow a remote attacker to gain privileges. The issue is due to the COM+ facility not properly creating and using memory structures. This may allow unauthenticated remote code execution. No further details have been provided. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | DCERPC DIRECT-UDP msdtc BuildContextW little endian object call overflow attempt RuleID : 6418 - Revision : 7 - Type : NETBIOS |
2014-01-10 | DCERPC DIRECT msdtc BuildContextW object call overflow attempt RuleID : 6417 - Revision : 7 - Type : NETBIOS |
2014-01-10 | DCERPC DIRECT-UDP msdtc BuildContextW object call overflow attempt RuleID : 6416 - Revision : 7 - Type : NETBIOS |
2014-01-10 | DCERPC DIRECT msdtc BuildContextW little endian object call overflow attempt RuleID : 6415 - Revision : 7 - Type : NETBIOS |
2014-01-10 | DCERPC DIRECT-UDP v4 msdtc BuildContextW little endian overflow attempt RuleID : 4252 - Revision : 9 - Type : NETBIOS |
2014-01-10 | DCERPC DIRECT-UDP msdtc BuildContextW little endian overflow attempt RuleID : 4251 - Revision : 9 - Type : NETBIOS |
2014-01-10 | DCERPC DIRECT msdtc BuildContextW overflow attempt RuleID : 4250 - Revision : 9 - Type : NETBIOS |
2014-01-10 | DCERPC DIRECT v4 msdtc BuildContextW little endian overflow attempt RuleID : 4249 - Revision : 7 - Type : NETBIOS |
2014-01-10 | DCERPC DIRECT-UDP msdtc BuildContextW overflow attempt RuleID : 4248 - Revision : 9 - Type : NETBIOS |
2014-01-10 | DCERPC DIRECT v4 msdtc BuildContextW overflow attempt RuleID : 4247 - Revision : 6 - Type : NETBIOS |
2014-01-10 | DCERPC NCADG-IP-UDP msdtc BuildContextW overflow attempt RuleID : 4246 - Revision : 14 - Type : OS-WINDOWS |
2014-01-10 | DCERPC NCACN-IP-TCP msdtc BuildContextW overflow attempt RuleID : 4245 - Revision : 14 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2005-10-12 | Name : A vulnerability in MSDTC could allow remote code execution. File : smb_kb902400.nasl - Type : ACT_GATHER_INFO |
2005-10-11 | Name : A vulnerability in MSDTC and COM+ could allow remote code execution. File : smb_nt_ms05-051.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:21:49 |
|
2024-11-28 12:07:11 |
|
2021-05-04 12:03:01 |
|
2021-04-22 01:03:17 |
|
2020-05-23 00:16:38 |
|
2018-10-13 00:22:31 |
|
2017-10-11 09:23:31 |
|
2016-04-26 13:36:55 |
|
2014-02-17 10:31:48 |
|
2013-05-11 11:27:38 |
|