CVE-2005-2120
Microsoft Windows 2000 - Buffer Overflow
Title source: ruleDescription
Stack-based buffer overflow in the Plug and Play (PnP) service (UMPNPMGR.DLL) in Microsoft Windows 2000 SP4, and XP SP1 and SP2, allows remote or local authenticated attackers to execute arbitrary code via a large number of "\" (backslash) characters in a registry key name, which triggers the overflow in a wsprintfW function call.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Winny Thomas · cdoswindows
https://www.exploit-db.com/exploits/1271
metasploit
WORKING POC
by hdm · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/dos/windows/smb/ms05_047_pnp.rb
References (15)
Scores
EPSS
0.7572
EPSS Percentile
98.9%
Details
Status
published
Products (2)
microsoft/windows_2000
microsoft/windows_xp
(2 CPE variants)
Published
Oct 13, 2005
Tracked Since
Feb 18, 2026