CVE-2005-2120

Microsoft Windows 2000 - Buffer Overflow

Title source: rule

Description

Stack-based buffer overflow in the Plug and Play (PnP) service (UMPNPMGR.DLL) in Microsoft Windows 2000 SP4, and XP SP1 and SP2, allows remote or local authenticated attackers to execute arbitrary code via a large number of "\" (backslash) characters in a registry key name, which triggers the overflow in a wsprintfW function call.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Winny Thomas · cdoswindows
https://www.exploit-db.com/exploits/1271
exploitdb WORKING POC VERIFIED
by anonymous · cdoswindows
https://www.exploit-db.com/exploits/1269
metasploit WORKING POC
by hdm · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/dos/windows/smb/ms05_047_pnp.rb

Scores

EPSS 0.7572
EPSS Percentile 98.9%

Details

Status published
Products (2)
microsoft/windows_2000
microsoft/windows_xp (2 CPE variants)
Published Oct 13, 2005
Tracked Since Feb 18, 2026