Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2005-2124 | First vendor Publication | 2005-11-29 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:H/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.6 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | High |
Cvss Expoit Score | 4.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Unspecified vulnerability in the Graphics Rendering Engine (GDI32.DLL) in Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1, related to "An unchecked buffer" and possibly buffer overflows, allows remote attackers to execute arbitrary code via a crafted Windows Metafile (WMF) format image, aka "Windows Metafile Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2124 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 | |
Os | 5 | |
Os | 3 |
ExploitDB Exploits
id | Description |
---|---|
2005-11-30 | MS Windows Metafile (mtNoObjects) Denial of Service Exploit (MS05-053) |
2005-11-29 | MS Windows Metafile (gdi32.dll) Denial of Service Exploit (MS05-053) |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
18820 | Microsoft Windows GDI EMF/WMF Metafile Processing Multiple Overflows Multiple remote overflows exist in Windows. The metafile rendering code in GDI32.DLL fails to validate EMF/WMF file data resulting in integer overflows. With a specially crafted file, an attacker can cause arbitrary code execution resulting in a loss of integrity. |
Snort® IPS/IDS
Date | Description |
---|---|
2017-09-26 | Microsoft Windows Metafile invalid header size integer overflow attempt RuleID : 44132 - Revision : 2 - Type : OS-WINDOWS |
2017-09-26 | Microsoft Windows Metafile invalid header size integer overflow attempt RuleID : 44131 - Revision : 2 - Type : OS-WINDOWS |
2017-09-26 | Microsoft Windows Metafile invalid header size integer overflow attempt RuleID : 44130 - Revision : 2 - Type : OS-WINDOWS |
2017-09-26 | Microsoft Windows Metafile invalid header size integer overflow attempt RuleID : 44129 - Revision : 2 - Type : OS-WINDOWS |
2017-09-26 | Microsoft Windows metafile SetPaletteEntries heap overflow attempt RuleID : 44128 - Revision : 1 - Type : FILE-IMAGE |
2016-03-14 | Microsoft emf file download request RuleID : 33740-community - Revision : 2 - Type : FILE-IMAGE |
2015-04-10 | Microsoft emf file download request RuleID : 33740 - Revision : 2 - Type : FILE-IMAGE |
2014-01-10 | Microsoft emf file download request RuleID : 2435-community - Revision : 33 - Type : FILE-IDENTIFY |
2014-01-10 | Microsoft emf file download request RuleID : 2435 - Revision : 33 - Type : FILE-IDENTIFY |
2014-01-10 | Microsoft Windows metafile SetPaletteEntries heap overflow attempt RuleID : 13807 - Revision : 16 - Type : FILE-IMAGE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2005-11-08 | Name : Arbitrary code can be executed on the remote host by sending a malformed file... File : smb_nt_ms05-053.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:21:35 |
|
2024-11-28 12:07:13 |
|
2021-05-04 12:03:03 |
|
2021-04-22 01:03:19 |
|
2020-05-23 00:16:40 |
|
2018-10-13 00:22:32 |
|
2016-04-26 13:38:23 |
|
2014-02-17 10:32:00 |
|
2014-01-19 21:22:48 |
|
2013-05-11 11:28:16 |
|