CVE-2005-2120

N/A Unknown
Published: October 13, 2005 Modified: April 16, 2026
View on NVD

Description

Stack-based buffer overflow in the Plug and Play (PnP) service (UMPNPMGR.DLL) in Microsoft Windows 2000 SP4, and XP SP1 and SP2, allows remote or local authenticated attackers to execute arbitrary code via a large number of "\" (backslash) characters in a registry key name, which triggers the overflow in a wsprintfW function call.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/17166
Source: secure@microsoft.com
Patch Vendor Advisory
http://secunia.com/advisories/17172
Source: secure@microsoft.com
http://secunia.com/advisories/17223
Source: secure@microsoft.com
http://securitytracker.com/id?1015042
Source: secure@microsoft.com
Patch
http://www.eeye.com/html/research/advisories/AD20051011c.html
Source: secure@microsoft.com
Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/214572
Source: secure@microsoft.com
Third Party Advisory US Government Resource
http://www.osvdb.org/18830
Source: secure@microsoft.com
http://www.securityfocus.com/bid/15065
Source: secure@microsoft.com
Exploit Patch
http://www.us-cert.gov/cas/techalerts/TA05-284A.html
Source: secure@microsoft.com
Third Party Advisory US Government Resource
http://secunia.com/advisories/17166
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/17172
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/17223
Source: af854a3a-2127-422b-91ae-364da2661108
http://securityreason.com/securityalert/71
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1015042
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.eeye.com/html/research/advisories/AD20051011c.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/214572
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.osvdb.org/18830
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/15065
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Patch
http://www.us-cert.gov/cas/techalerts/TA05-284A.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource

30 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
75.7%
99th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

microsoft