ID CVE-2005-1978
Summary COM+ in Microsoft Windows does not properly "create and use memory structures," which allows local users or remote attackers to execute arbitrary code.
References
Vulnerable Configurations
  • cpe:2.3:o:microsoft:windows_2000:-:sp4:-:fr
    cpe:2.3:o:microsoft:windows_2000:-:sp4:-:fr
  • cpe:2.3:o:microsoft:windows_2003_server:64-bit
    cpe:2.3:o:microsoft:windows_2003_server:64-bit
  • cpe:2.3:o:microsoft:windows_2003_server:itanium
    cpe:2.3:o:microsoft:windows_2003_server:itanium
  • cpe:2.3:o:microsoft:windows_2003_server:r2
    cpe:2.3:o:microsoft:windows_2003_server:r2
  • cpe:2.3:o:microsoft:windows_2003_server:sp1
    cpe:2.3:o:microsoft:windows_2003_server:sp1
  • cpe:2.3:o:microsoft:windows_2003_server:sp1:-:itanium
    cpe:2.3:o:microsoft:windows_2003_server:sp1:-:itanium
  • cpe:2.3:o:microsoft:windows_xp:-:64-bit
    cpe:2.3:o:microsoft:windows_xp:-:64-bit
  • Microsoft windows xp_sp1 tablet_pc
    cpe:2.3:o:microsoft:windows_xp:-:sp1:tablet_pc
  • Microsoft windows xp_sp2 tablet_pc
    cpe:2.3:o:microsoft:windows_xp:-:sp2:tablet_pc
CVSS
Base: 7.5 (as of 12-10-2005 - 09:54)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
exploit-db via4
description Microsoft Windows DTC Remote Exploit (PoC) (MS05-051) (updated). CVE-2005-1978,CVE-2005-1979,CVE-2005-1980,CVE-2005-2119. Remote exploit for windows platform
id EDB-ID:1352
last seen 2016-01-31
modified 2005-12-01
published 2005-12-01
reporter Swan
source https://www.exploit-db.com/download/1352/
title Microsoft Windows DTC Remote Exploit PoC MS05-051 updated
nessus via4
  • NASL family Windows : Microsoft Bulletins
    NASL id SMB_NT_MS05-051.NASL
    description The remote version of Windows contains a version of MSDTC and COM+ that is affected by several remote code execution, local privilege escalation and denial of service vulnerabilities. An attacker may exploit these flaws to obtain the complete control of the remote host.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 20004
    published 2005-10-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=20004
    title MS05-051: Vulnerabilities in MSDTC and COM+ Could Allow Remote Code Execution (902400)
  • NASL family Windows
    NASL id SMB_KB902400.NASL
    description The remote version of Windows contains a version of MSDTC (Microsoft Data Transaction Coordinator) service that has several remote code execution, local privilege escalation, and denial of service vulnerabilities. An attacker may exploit these flaws to obtain the complete control of the remote host.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 20008
    published 2005-10-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=20008
    title MS05-051: Vulnerabilities in MSDTC Could Allow Remote Code Execution (902400) (uncredentialed check)
oval via4
  • accepted 2011-05-16T04:00:42.741-04:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Shane Shaffer
      organization G2, Inc.
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    description COM+ in Microsoft Windows does not properly "create and use memory structures," which allows local users or remote attackers to execute arbitrary code.
    family windows
    id oval:org.mitre.oval:def:1261
    status accepted
    submitted 2005-10-12T12:00:00.000-04:00
    title COM+ Memory Structures Process Permits Remote Code Execution (64-bit XP,SP1)
    version 68
  • accepted 2011-05-16T04:00:45.483-04:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Shane Shaffer
      organization G2, Inc.
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    description COM+ in Microsoft Windows does not properly "create and use memory structures," which allows local users or remote attackers to execute arbitrary code.
    family windows
    id oval:org.mitre.oval:def:1269
    status accepted
    submitted 2005-10-12T12:00:00.000-04:00
    title COM+ Memory Structures Process Permits Remote Code Execution (WinXP,SP1)
    version 68
  • accepted 2011-05-16T04:01:04.545-04:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Jonathan Baker
      organization The MITRE Corporation
    • name Shane Shaffer
      organization G2, Inc.
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    description COM+ in Microsoft Windows does not properly "create and use memory structures," which allows local users or remote attackers to execute arbitrary code.
    family windows
    id oval:org.mitre.oval:def:1466
    status accepted
    submitted 2005-10-12T12:00:00.000-04:00
    title COM+ Memory Structures Process Permits Remote Code Execution (Server 2003)
    version 69
  • accepted 2011-05-16T04:01:09.272-04:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Dragos Prisaca
      organization Gideon Technologies, Inc.
    • name Shane Shaffer
      organization G2, Inc.
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    description COM+ in Microsoft Windows does not properly "create and use memory structures," which allows local users or remote attackers to execute arbitrary code.
    family windows
    id oval:org.mitre.oval:def:1499
    status accepted
    submitted 2005-10-12T12:00:00.000-04:00
    title COM+ Memory Structures Process Permits Remote Code Execution (XP,SP2)
    version 69
  • accepted 2011-05-16T04:03:13.535-04:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Shane Shaffer
      organization G2, Inc.
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    description COM+ in Microsoft Windows does not properly "create and use memory structures," which allows local users or remote attackers to execute arbitrary code.
    family windows
    id oval:org.mitre.oval:def:576
    status accepted
    submitted 2005-10-12T12:00:00.000-04:00
    title COM+ Memory Structures Process Permits Remote Code Execution (Server 2003,SP1)
    version 68
  • accepted 2011-05-16T04:03:32.111-04:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name John Hoyland
      organization Centennial Software
    • name Shane Shaffer
      organization G2, Inc.
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    description COM+ in Microsoft Windows does not properly "create and use memory structures," which allows local users or remote attackers to execute arbitrary code.
    family windows
    id oval:org.mitre.oval:def:816
    status accepted
    submitted 2005-10-12T12:00:00.000-04:00
    title COM+ Memory Structures Process Permits Remote Code Execution (Win2k,SP4)
    version 69
refmap via4
bid 15057
cert TA05-284A
cert-vn VU#950516
confirm http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf
ms MS05-051
secunia
  • 17161
  • 17172
  • 17223
  • 17509
Last major update 10-09-2008 - 15:40
Published 12-10-2005 - 09:04
Last modified 12-10-2018 - 17:36
Back to Top