CVE-2005-0852 : Detail

CVE-2005-0852

0.04%V3
Local
2005-03-24
05h00 +00:00
2024-09-16
19h30 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Microsoft Windows XP SP1 allows local users to cause a denial of service (system crash) via an empty datagram to a raw IP over IP socket (IP protocol 4), as originally demonstrated using code in Python 2.3.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 2.1 AV:L/AC:L/Au:N/C:N/I:N/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 25259

Publication date : 2005-03-21 23h00 +00:00
Author : [email protected]
EDB Verified : Yes

source: https://www.securityfocus.com/bid/12870/info It is reported that Microsoft Windows XP Service Pack 1 is prone to a local denial of service vulnerability. The issue is reported to manifest when a raw IP over IP socket is created and data is transferred over the newly created socket. It is reported that this operation causes the kernel of the Windows computer to crash, resulting in the computer rebooting. If this issue can be triggered reliably, a local attacker may exploit the issue to deny service for legitimate users. Further investigation into this issue is ongoing; this BID will be updated as soon as more details are available. import socket s=socket.socket(socket.AF_INET,socket.SOCK_RAW,4) s.sendto("",("x.x.x.x",0)) Press ENTER and your win box should crash immediately.

Products Mentioned

Configuraton 0

Microsoft>>Windows_xp >> Version *

Microsoft>>Windows_xp >> Version *

Microsoft>>Windows_xp >> Version *

Microsoft>>Windows_xp >> Version *

References

http://www.securityfocus.com/bid/12870
Tags : vdb-entry, x_refsource_BID
http://www.securityfocus.com/archive/1/393956
Tags : mailing-list, x_refsource_BUGTRAQ