Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2005-1979 | First vendor Publication | 2005-10-12 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service exception and exit) via an "unexpected protocol command during the reconnection request," which is not properly handled by the Transaction Internet Protocol (TIP) functionality. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1979 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:1134 | |||
Oval ID: | oval:org.mitre.oval:def:1134 | ||
Title: | TIP Request Validation Process Permits Denial of Service (XP,SP2) | ||
Description: | Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service exception and exit) via an "unexpected protocol command during the reconnection request," which is not properly handled by the Transaction Internet Protocol (TIP) functionality. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-1979 | Version: | 5 |
Platform(s): | Microsoft Windows XP | Product(s): | TIP |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1283 | |||
Oval ID: | oval:org.mitre.oval:def:1283 | ||
Title: | TIP Request Validation Process Permits Denial of Service (WinXP,SP1) | ||
Description: | Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service exception and exit) via an "unexpected protocol command during the reconnection request," which is not properly handled by the Transaction Internet Protocol (TIP) functionality. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-1979 | Version: | 4 |
Platform(s): | Microsoft Windows XP | Product(s): | TIP |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1338 | |||
Oval ID: | oval:org.mitre.oval:def:1338 | ||
Title: | TIP Request Validation Process Permits Denial of Service (Win2k,SP4) | ||
Description: | Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service exception and exit) via an "unexpected protocol command during the reconnection request," which is not properly handled by the Transaction Internet Protocol (TIP) functionality. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-1979 | Version: | 4 |
Platform(s): | Microsoft Windows 2000 | Product(s): | TIP |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1513 | |||
Oval ID: | oval:org.mitre.oval:def:1513 | ||
Title: | TIP Request Validation Process Permits Denial of Service (64-bit XP,SP1) | ||
Description: | Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service exception and exit) via an "unexpected protocol command during the reconnection request," which is not properly handled by the Transaction Internet Protocol (TIP) functionality. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-1979 | Version: | 4 |
Platform(s): | Microsoft Windows XP | Product(s): | TIP |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1550 | |||
Oval ID: | oval:org.mitre.oval:def:1550 | ||
Title: | TIP Request Validation Process Permits Denial of Service (Server 2003) | ||
Description: | Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service exception and exit) via an "unexpected protocol command during the reconnection request," which is not properly handled by the Transaction Internet Protocol (TIP) functionality. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-1979 | Version: | 5 |
Platform(s): | Microsoft Windows Server 2003 | Product(s): | TIP |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:686 | |||
Oval ID: | oval:org.mitre.oval:def:686 | ||
Title: | TIP Request Validation Process Permits Denial of Service (Server 2003,SP1) | ||
Description: | Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service exception and exit) via an "unexpected protocol command during the reconnection request," which is not properly handled by the Transaction Internet Protocol (TIP) functionality. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-1979 | Version: | 4 |
Platform(s): | Microsoft Windows Server 2003 | Product(s): | TIP |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 | |
Os | 5 | |
Os | 3 |
ExploitDB Exploits
id | Description |
---|---|
2005-10-11 | Microsoft Windows 2000/2003/XP MSDTC TIP Denial Of Service Vulnerability |
OpenVAS Exploits
Date | Description |
---|---|
2009-11-16 | Name : Microsoft RPC Interface Buffer Overrun (KB824146) File : nvt/msrpc_dcom2.nasl |
2005-11-03 | Name : Microsoft RPC Interface Buffer Overrun (823980) File : nvt/msrpc_dcom.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
19903 | Microsoft Windows DTC Transaction Internet Protocol (TIP) DoS Microsoft Windows has a flaw that may allow a remote attacker to cause a denial of service. The issue is due to the Transaction Internet Protocol (TIP) functionality of the Distributed Transaction Controller not properly sanitizing data sent by remote servers. With an unexpected protocol command during a reconnection request, a remote attacker can cause the MSDTC service to have an exception and exit. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | DCERPC DIRECT-UDP msdtc BuildContextW little endian object call overflow attempt RuleID : 6418 - Revision : 7 - Type : NETBIOS |
2014-01-10 | DCERPC DIRECT msdtc BuildContextW object call overflow attempt RuleID : 6417 - Revision : 7 - Type : NETBIOS |
2014-01-10 | DCERPC DIRECT-UDP msdtc BuildContextW object call overflow attempt RuleID : 6416 - Revision : 7 - Type : NETBIOS |
2014-01-10 | DCERPC DIRECT msdtc BuildContextW little endian object call overflow attempt RuleID : 6415 - Revision : 7 - Type : NETBIOS |
2014-01-10 | DCERPC DIRECT-UDP v4 msdtc BuildContextW little endian overflow attempt RuleID : 4252 - Revision : 9 - Type : NETBIOS |
2014-01-10 | DCERPC DIRECT-UDP msdtc BuildContextW little endian overflow attempt RuleID : 4251 - Revision : 9 - Type : NETBIOS |
2014-01-10 | DCERPC DIRECT msdtc BuildContextW overflow attempt RuleID : 4250 - Revision : 9 - Type : NETBIOS |
2014-01-10 | DCERPC DIRECT v4 msdtc BuildContextW little endian overflow attempt RuleID : 4249 - Revision : 7 - Type : NETBIOS |
2014-01-10 | DCERPC DIRECT-UDP msdtc BuildContextW overflow attempt RuleID : 4248 - Revision : 9 - Type : NETBIOS |
2014-01-10 | DCERPC DIRECT v4 msdtc BuildContextW overflow attempt RuleID : 4247 - Revision : 6 - Type : NETBIOS |
2014-01-10 | DCERPC NCADG-IP-UDP msdtc BuildContextW overflow attempt RuleID : 4246 - Revision : 14 - Type : OS-WINDOWS |
2014-01-10 | DCERPC NCACN-IP-TCP msdtc BuildContextW overflow attempt RuleID : 4245 - Revision : 14 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Distributed Transaction Controller TIP DoS attempt RuleID : 17439 - Revision : 7 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2005-10-12 | Name : A vulnerability in MSDTC could allow remote code execution. File : smb_kb902400.nasl - Type : ACT_GATHER_INFO |
2005-10-11 | Name : A vulnerability in MSDTC and COM+ could allow remote code execution. File : smb_nt_ms05-051.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:21:49 |
|
2024-11-28 12:07:11 |
|
2021-05-04 12:03:01 |
|
2021-04-22 01:03:17 |
|
2020-05-23 00:16:38 |
|
2018-10-13 00:22:31 |
|
2017-10-11 09:23:31 |
|
2016-04-26 13:36:55 |
|
2014-02-17 10:31:48 |
|
2014-01-19 21:22:46 |
|
2013-05-11 11:27:38 |
|