ID CVE-2005-1979
Summary Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service exception and exit) via an "unexpected protocol command during the reconnection request," which is not properly handled by the Transaction Internet Protocol (TIP) functionality.
References
Vulnerable Configurations
  • cpe:2.3:o:microsoft:windows_2000:-:sp4:-:fr
    cpe:2.3:o:microsoft:windows_2000:-:sp4:-:fr
  • cpe:2.3:o:microsoft:windows_2003_server:64-bit
    cpe:2.3:o:microsoft:windows_2003_server:64-bit
  • cpe:2.3:o:microsoft:windows_2003_server:itanium
    cpe:2.3:o:microsoft:windows_2003_server:itanium
  • cpe:2.3:o:microsoft:windows_2003_server:r2
    cpe:2.3:o:microsoft:windows_2003_server:r2
  • cpe:2.3:o:microsoft:windows_2003_server:sp1
    cpe:2.3:o:microsoft:windows_2003_server:sp1
  • cpe:2.3:o:microsoft:windows_2003_server:sp1:-:itanium
    cpe:2.3:o:microsoft:windows_2003_server:sp1:-:itanium
  • cpe:2.3:o:microsoft:windows_xp:-:64-bit
    cpe:2.3:o:microsoft:windows_xp:-:64-bit
  • Microsoft windows xp_sp1 tablet_pc
    cpe:2.3:o:microsoft:windows_xp:-:sp1:tablet_pc
  • Microsoft windows xp_sp2 tablet_pc
    cpe:2.3:o:microsoft:windows_xp:-:sp2:tablet_pc
CVSS
Base: 5.0 (as of 12-10-2005 - 09:54)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
exploit-db via4
description Microsoft Windows DTC Remote Exploit (PoC) (MS05-051) (updated). CVE-2005-1978,CVE-2005-1979,CVE-2005-1980,CVE-2005-2119. Remote exploit for windows platform
id EDB-ID:1352
last seen 2016-01-31
modified 2005-12-01
published 2005-12-01
reporter Swan
source https://www.exploit-db.com/download/1352/
title Microsoft Windows DTC Remote Exploit PoC MS05-051 updated
nessus via4
  • NASL family Windows : Microsoft Bulletins
    NASL id SMB_NT_MS05-051.NASL
    description The remote version of Windows contains a version of MSDTC and COM+ that is affected by several remote code execution, local privilege escalation and denial of service vulnerabilities. An attacker may exploit these flaws to obtain the complete control of the remote host.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 20004
    published 2005-10-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=20004
    title MS05-051: Vulnerabilities in MSDTC and COM+ Could Allow Remote Code Execution (902400)
  • NASL family Windows
    NASL id SMB_KB902400.NASL
    description The remote version of Windows contains a version of MSDTC (Microsoft Data Transaction Coordinator) service that has several remote code execution, local privilege escalation, and denial of service vulnerabilities. An attacker may exploit these flaws to obtain the complete control of the remote host.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 20008
    published 2005-10-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=20008
    title MS05-051: Vulnerabilities in MSDTC Could Allow Remote Code Execution (902400) (uncredentialed check)
oval via4
  • accepted 2011-05-16T04:00:22.451-04:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Dragos Prisaca
      organization Gideon Technologies, Inc.
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    description Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service exception and exit) via an "unexpected protocol command during the reconnection request," which is not properly handled by the Transaction Internet Protocol (TIP) functionality.
    family windows
    id oval:org.mitre.oval:def:1134
    status accepted
    submitted 2005-10-12T12:00:00.000-04:00
    title TIP Request Validation Process Permits Denial of Service (XP,SP2)
    version 69
  • accepted 2011-05-16T04:00:46.513-04:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    description Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service exception and exit) via an "unexpected protocol command during the reconnection request," which is not properly handled by the Transaction Internet Protocol (TIP) functionality.
    family windows
    id oval:org.mitre.oval:def:1283
    status accepted
    submitted 2005-10-12T12:00:00.000-04:00
    title TIP Request Validation Process Permits Denial of Service (WinXP,SP1)
    version 68
  • accepted 2011-05-16T04:00:53.864-04:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    description Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service exception and exit) via an "unexpected protocol command during the reconnection request," which is not properly handled by the Transaction Internet Protocol (TIP) functionality.
    family windows
    id oval:org.mitre.oval:def:1338
    status accepted
    submitted 2005-10-12T12:00:00.000-04:00
    title TIP Request Validation Process Permits Denial of Service (Win2k,SP4)
    version 67
  • accepted 2011-05-16T04:01:11.213-04:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    description Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service exception and exit) via an "unexpected protocol command during the reconnection request," which is not properly handled by the Transaction Internet Protocol (TIP) functionality.
    family windows
    id oval:org.mitre.oval:def:1513
    status accepted
    submitted 2005-10-12T12:00:00.000-04:00
    title TIP Request Validation Process Permits Denial of Service (64-bit XP,SP1)
    version 68
  • accepted 2011-05-16T04:01:18.337-04:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Jonathan Baker
      organization The MITRE Corporation
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    description Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service exception and exit) via an "unexpected protocol command during the reconnection request," which is not properly handled by the Transaction Internet Protocol (TIP) functionality.
    family windows
    id oval:org.mitre.oval:def:1550
    status accepted
    submitted 2005-10-12T12:00:00.000-04:00
    title TIP Request Validation Process Permits Denial of Service (Server 2003)
    version 68
  • accepted 2011-05-16T04:03:21.669-04:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    description Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service exception and exit) via an "unexpected protocol command during the reconnection request," which is not properly handled by the Transaction Internet Protocol (TIP) functionality.
    family windows
    id oval:org.mitre.oval:def:686
    status accepted
    submitted 2005-10-12T12:00:00.000-04:00
    title TIP Request Validation Process Permits Denial of Service (Server 2003,SP1)
    version 68
refmap via4
bid 15058
confirm http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf
idefense 20051011 Microsoft Distributed Transaction Controller TIP DoS Vulnerability
ms MS05-051
sectrack 1015037
secunia
  • 17161
  • 17172
  • 17223
  • 17509
Last major update 10-09-2008 - 15:40
Published 12-10-2005 - 09:04
Last modified 12-10-2018 - 17:36
Back to Top