Ms05-047.c

所属分类:Windows编程
开发工具:C/C++
文件大小:2KB
下载次数:6
上传日期:2005-11-02 13:07:51
上 传 者奇异果
说明:  Microsoft Windows Plug and Play Remote Code Execution (MS05-047)

文件列表:
MS05-047.c (13218, 2005-11-02)

Microsoft Windows Plug and Play Remote Code Execution (MS05-047) A vulnerability has been identified in Microsoft Windows, which may be exploited by attackers to execute abitrary commands or by malicious users to obtain elevated privileges. This issue is due to a buffer overflow error in the Plug and Play (PnP) service that does not properly validate user supplied data to the functions "PNP_GetDeviceList" and "PNP_GetDeviceListSize", which could be exploited by attackers to execute arbitrary commands. Note : On Windows 2000 and Windows XP SP1, an authenticated user could remotely exploit this vulnerability, however, in certain Windows XP configurations, anonymous users could authenticate and exploit this vulnerability as the Guest account. On Windows XP SP2, only an administrator can remotely access the affected component. Therefore, on Windows XP SP2, this issue is strictly a local privilege elevation vulnerability. ***************************** CVE-2005-2120 (under review) Stack-based buffer overflow in the Plug and Play (PnP) service (UMPNPMGR.DLL) in Microsoft Windows 2000 SP4, and XP SP1 and SP2, allows remote or local authenticated attackers to execute arbitrary code via a large number of "\" (backslash) characters in a registry key name, which triggers the overflow in a wsprintfW function call.

近期下载者

相关文件


收藏者