CVE-2005-1983

Description

Stack-based buffer overflow in the Plug and Play (PnP) service for Microsoft Windows 2000 and Windows XP Service Pack 1 allows remote attackers to execute arbitrary code via a crafted packet, and local users to gain privileges via a malicious application, as exploited by the Zotob (aka Mytob) worm.

10.0
CVSS
Severity: Critical
CVSS 2.0 •
EPSS 87.98% Top 5%
Vendor Advisory microsoft.com
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
http://www.vupen.com/english/advisories/2005/1354 vdb entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A497 vdb entry signature
http://www.hsc.fr/ressources/presentations/null_sessions/
http://www.osvdb.org/18605 vdb entry
http://www.frsirt.com/english/alerts/20050814.ZotobA.php
http://archives.neohapsis.com/archives/fulldisclosure/2005-08/0384.html mailing list
http://www.kb.cert.org/vuls/id/998653 third party advisory us government resource
http://www.securityfocus.com/bid/14513 vdb entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A267 vdb entry signature
http://www.ciac.org/ciac/bulletins/p-266.shtml third party advisory government resource
http://securitytracker.com/id?1014640 vdb entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/21602 vdb entry
http://www.us-cert.gov/cas/techalerts/TA05-221A.html us government resource third party advisory patch
http://secunia.com/advisories/16372 third party advisory
http://xforce.iss.net/xforce/alerts/id/202 third party advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100073 vdb entry signature
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-039 vendor advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A160 vdb entry signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A474 vdb entry signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A783 vdb entry signature
http://www.securiteam.com/windowsntfocus/5YP0E00GKW.html

Frequently Asked Questions

What is the severity of CVE-2005-1983?
CVE-2005-1983 has been scored as a critical severity vulnerability.
How to fix CVE-2005-1983?
To fix CVE-2005-1983, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2005-1983 being actively exploited in the wild?
It is possible that CVE-2005-1983 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~88% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.