[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Plug and Play User Data Validation Vulnerability (Windows 2000)

ID: oval:org.mitre.oval:def:1244Date: (C)2005-10-12   (M)2021-07-09
Class: VULNERABILITYFamily: windows




Stack-based buffer overflow in the Plug and Play (PnP) service (UMPNPMGR.DLL) in Microsoft Windows 2000 SP4, and XP SP1 and SP2, allows remote or local authenticated attackers to execute arbitrary code via a large number of "\" (backslash) characters in a registry key name, which triggers the overflow in a wsprintfW function call.

Platform:
Microsoft Windows 2000
Reference:
CVE-2005-2120
CVE    1
CVE-2005-2120

© SecPod Technologies