ID CVE-2005-2119
Summary The MIDL_user_allocate function in the Microsoft Distributed Transaction Coordinator (MSDTC) proxy (MSDTCPRX.DLL) allocates a 4K page of memory regardless of the required size, which allows attackers to overwrite arbitrary memory locations using an incorrect size value that is provided to the NdrAllocate function, which writes management data to memory outside of the allocated buffer.
References
Vulnerable Configurations
  • cpe:2.3:o:microsoft:windows_2000:-:sp4:-:fr
    cpe:2.3:o:microsoft:windows_2000:-:sp4:-:fr
  • cpe:2.3:o:microsoft:windows_2003_server:64-bit
    cpe:2.3:o:microsoft:windows_2003_server:64-bit
  • cpe:2.3:o:microsoft:windows_2003_server:itanium
    cpe:2.3:o:microsoft:windows_2003_server:itanium
  • cpe:2.3:o:microsoft:windows_2003_server:r2
    cpe:2.3:o:microsoft:windows_2003_server:r2
  • cpe:2.3:o:microsoft:windows_2003_server:sp1
    cpe:2.3:o:microsoft:windows_2003_server:sp1
  • cpe:2.3:o:microsoft:windows_2003_server:sp1:-:itanium
    cpe:2.3:o:microsoft:windows_2003_server:sp1:-:itanium
  • cpe:2.3:o:microsoft:windows_xp:-:64-bit
    cpe:2.3:o:microsoft:windows_xp:-:64-bit
  • Microsoft windows xp_sp1 tablet_pc
    cpe:2.3:o:microsoft:windows_xp:-:sp1:tablet_pc
  • Microsoft windows xp_sp2 tablet_pc
    cpe:2.3:o:microsoft:windows_xp:-:sp2:tablet_pc
CVSS
Base: 5.0 (as of 12-10-2005 - 09:54)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
exploit-db via4
  • description Microsoft Windows DTC Remote Exploit (PoC) (MS05-051) (updated). CVE-2005-1978,CVE-2005-1979,CVE-2005-1980,CVE-2005-2119. Remote exploit for windows platform
    id EDB-ID:1352
    last seen 2016-01-31
    modified 2005-12-01
    published 2005-12-01
    reporter Swan
    source https://www.exploit-db.com/download/1352/
    title Microsoft Windows DTC Remote Exploit PoC MS05-051 updated
  • description MS Windows MSDTC Service Remote Memory Modification PoC (MS05-051). CVE-2005-2119. Dos exploit for windows platform
    id EDB-ID:1341
    last seen 2016-01-31
    modified 2005-11-27
    published 2005-11-27
    reporter darkeagle
    source https://www.exploit-db.com/download/1341/
    title Microsoft Windows MSDTC Service Remote Memory Modification PoC MS05-051
nessus via4
  • NASL family Windows : Microsoft Bulletins
    NASL id SMB_NT_MS05-051.NASL
    description The remote version of Windows contains a version of MSDTC and COM+ that is affected by several remote code execution, local privilege escalation and denial of service vulnerabilities. An attacker may exploit these flaws to obtain the complete control of the remote host.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 20004
    published 2005-10-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=20004
    title MS05-051: Vulnerabilities in MSDTC and COM+ Could Allow Remote Code Execution (902400)
  • NASL family Windows
    NASL id SMB_KB902400.NASL
    description The remote version of Windows contains a version of MSDTC (Microsoft Data Transaction Coordinator) service that has several remote code execution, local privilege escalation, and denial of service vulnerabilities. An attacker may exploit these flaws to obtain the complete control of the remote host.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 20008
    published 2005-10-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=20008
    title MS05-051: Vulnerabilities in MSDTC Could Allow Remote Code Execution (902400) (uncredentialed check)
oval via4
  • accepted 2011-05-16T04:00:16.413-04:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    description The MIDL_user_allocate function in the Microsoft Distributed Transaction Coordinator (MSDTC) proxy (MSDTCPRX.DLL) allocates a 4K page of memory regardless of the required size, which allows attackers to overwrite arbitrary memory locations using an incorrect size value that is provided to the NdrAllocate function, which writes management data to memory outside of the allocated buffer.
    family windows
    id oval:org.mitre.oval:def:1071
    status accepted
    submitted 2005-10-12T12:00:00.000-04:00
    title MSDTC Unchecked Buffer Permits Remote Code Execution or Privilege Elevation (WinXP,SP1)
    version 68
  • accepted 2011-05-16T04:01:02.533-04:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Jonathan Baker
      organization The MITRE Corporation
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    description The MIDL_user_allocate function in the Microsoft Distributed Transaction Coordinator (MSDTC) proxy (MSDTCPRX.DLL) allocates a 4K page of memory regardless of the required size, which allows attackers to overwrite arbitrary memory locations using an incorrect size value that is provided to the NdrAllocate function, which writes management data to memory outside of the allocated buffer.
    family windows
    id oval:org.mitre.oval:def:1452
    status accepted
    submitted 2005-10-12T12:00:00.000-04:00
    title MSDTC Unchecked Buffer Permits Remote Code Execution or Privilege Elevation (Server 2003)
    version 68
  • accepted 2011-05-16T04:03:10.701-04:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name John Hoyland
      organization Centennial Software
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    description The MIDL_user_allocate function in the Microsoft Distributed Transaction Coordinator (MSDTC) proxy (MSDTCPRX.DLL) allocates a 4K page of memory regardless of the required size, which allows attackers to overwrite arbitrary memory locations using an incorrect size value that is provided to the NdrAllocate function, which writes management data to memory outside of the allocated buffer.
    family windows
    id oval:org.mitre.oval:def:551
    status accepted
    submitted 2005-10-12T12:00:00.000-04:00
    title MSDTC Unchecked Buffer Permits Remote Code Execution or Privilege Elevation (Win2k,SP4)
    version 68
refmap via4
bid 15056
cert TA05-284A
cert-vn VU#180868
confirm http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf
eeye
  • AD20051011b
  • EEYEB20050708
ms MS05-051
osvdb 18828
sectrack 1015037
secunia
  • 17161
  • 17172
  • 17223
  • 17509
sreason 73
Last major update 10-09-2008 - 15:41
Published 12-10-2005 - 09:04
Last modified 12-10-2018 - 17:37
Back to Top