Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2005-1980 | First vendor Publication | 2005-10-12 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service hang) via a crafted Transaction Internet Protocol (TIP) message that causes DTC to repeatedly connect to a target IP and port number after an error occurs, aka the "Distributed TIP Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1980 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:1136 | |||
Oval ID: | oval:org.mitre.oval:def:1136 | ||
Title: | Distributed TIP Request Validation Process Permits Denial of Service (Server 2003,SP1) | ||
Description: | Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service hang) via a crafted Transaction Internet Protocol (TIP) message that causes DTC to repeatedly connect to a target IP and port number after an error occurs, aka the "Distributed TIP Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-1980 | Version: | 4 |
Platform(s): | Microsoft Windows Server 2003 | Product(s): | TIP |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1182 | |||
Oval ID: | oval:org.mitre.oval:def:1182 | ||
Title: | Distributed TIP Request Validation Process Permits Denial of Service (XP,SP2) | ||
Description: | Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service hang) via a crafted Transaction Internet Protocol (TIP) message that causes DTC to repeatedly connect to a target IP and port number after an error occurs, aka the "Distributed TIP Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-1980 | Version: | 5 |
Platform(s): | Microsoft Windows XP | Product(s): | TIP |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1203 | |||
Oval ID: | oval:org.mitre.oval:def:1203 | ||
Title: | Distributed TIP Request Validation Process Permits Denial of Service (WinXP,SP1) | ||
Description: | Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service hang) via a crafted Transaction Internet Protocol (TIP) message that causes DTC to repeatedly connect to a target IP and port number after an error occurs, aka the "Distributed TIP Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-1980 | Version: | 4 |
Platform(s): | Microsoft Windows XP | Product(s): | TIP |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1253 | |||
Oval ID: | oval:org.mitre.oval:def:1253 | ||
Title: | Distributed TIP Request Validation Process Permits Denial of Service (Win2k,SP4) | ||
Description: | Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service hang) via a crafted Transaction Internet Protocol (TIP) message that causes DTC to repeatedly connect to a target IP and port number after an error occurs, aka the "Distributed TIP Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-1980 | Version: | 4 |
Platform(s): | Microsoft Windows 2000 | Product(s): | TIP |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1325 | |||
Oval ID: | oval:org.mitre.oval:def:1325 | ||
Title: | Distributed TIP Request Validation Process Permits Denial of Service (64-bit XP,SP1) | ||
Description: | Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service hang) via a crafted Transaction Internet Protocol (TIP) message that causes DTC to repeatedly connect to a target IP and port number after an error occurs, aka the "Distributed TIP Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-1980 | Version: | 4 |
Platform(s): | Microsoft Windows XP | Product(s): | TIP |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1413 | |||
Oval ID: | oval:org.mitre.oval:def:1413 | ||
Title: | Distributed TIP Request Validation Process Permits Denial of Service (Server 2003) | ||
Description: | Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service hang) via a crafted Transaction Internet Protocol (TIP) message that causes DTC to repeatedly connect to a target IP and port number after an error occurs, aka the "Distributed TIP Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-1980 | Version: | 5 |
Platform(s): | Microsoft Windows Server 2003 | Product(s): | TIP |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 | |
Os | 5 | |
Os | 3 |
ExploitDB Exploits
id | Description |
---|---|
2005-10-11 | Microsoft Windows 2000/2003/XP MSDTC TIP Denial Of Service Vulnerability |
OpenVAS Exploits
Date | Description |
---|---|
2009-11-16 | Name : Microsoft RPC Interface Buffer Overrun (KB824146) File : nvt/msrpc_dcom2.nasl |
2005-11-03 | Name : Microsoft RPC Interface Buffer Overrun (823980) File : nvt/msrpc_dcom.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
19904 | Microsoft Windows DTC Packet Relay DoS Microsoft Windows contains a flaw that may allow a remote attacker to cause a denial of service. The issue is due to the Distributed Transaction Controller (MSDTC) not properly handling crafted Transaction Internet Protocol (TIP) message traffic that repeatedly connects after an error occurs. This may cause the service to hang and require a restart by the administrator. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | DCERPC DIRECT-UDP msdtc BuildContextW little endian object call overflow attempt RuleID : 6418 - Revision : 7 - Type : NETBIOS |
2014-01-10 | DCERPC DIRECT msdtc BuildContextW object call overflow attempt RuleID : 6417 - Revision : 7 - Type : NETBIOS |
2014-01-10 | DCERPC DIRECT-UDP msdtc BuildContextW object call overflow attempt RuleID : 6416 - Revision : 7 - Type : NETBIOS |
2014-01-10 | DCERPC DIRECT msdtc BuildContextW little endian object call overflow attempt RuleID : 6415 - Revision : 7 - Type : NETBIOS |
2014-01-10 | DCERPC DIRECT-UDP v4 msdtc BuildContextW little endian overflow attempt RuleID : 4252 - Revision : 9 - Type : NETBIOS |
2014-01-10 | DCERPC DIRECT-UDP msdtc BuildContextW little endian overflow attempt RuleID : 4251 - Revision : 9 - Type : NETBIOS |
2014-01-10 | DCERPC DIRECT msdtc BuildContextW overflow attempt RuleID : 4250 - Revision : 9 - Type : NETBIOS |
2014-01-10 | DCERPC DIRECT v4 msdtc BuildContextW little endian overflow attempt RuleID : 4249 - Revision : 7 - Type : NETBIOS |
2014-01-10 | DCERPC DIRECT-UDP msdtc BuildContextW overflow attempt RuleID : 4248 - Revision : 9 - Type : NETBIOS |
2014-01-10 | DCERPC DIRECT v4 msdtc BuildContextW overflow attempt RuleID : 4247 - Revision : 6 - Type : NETBIOS |
2014-01-10 | DCERPC NCADG-IP-UDP msdtc BuildContextW overflow attempt RuleID : 4246 - Revision : 14 - Type : OS-WINDOWS |
2014-01-10 | DCERPC NCACN-IP-TCP msdtc BuildContextW overflow attempt RuleID : 4245 - Revision : 14 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2005-10-12 | Name : A vulnerability in MSDTC could allow remote code execution. File : smb_kb902400.nasl - Type : ACT_GATHER_INFO |
2005-10-11 | Name : A vulnerability in MSDTC and COM+ could allow remote code execution. File : smb_nt_ms05-051.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:21:49 |
|
2024-11-28 12:07:11 |
|
2021-05-04 12:03:01 |
|
2021-04-22 01:03:17 |
|
2020-05-23 00:16:38 |
|
2018-10-13 00:22:31 |
|
2017-10-11 09:23:31 |
|
2016-04-26 13:36:56 |
|
2014-02-17 10:31:48 |
|
2013-05-11 11:27:38 |
|