MS.Windows.PnP.DoS
Description
This indicates a possible attempt to exploit a stack-based buffer-overflow vulnerability in the Plug and Play service of Microsoft Windows.
The vulnerability is in UMPNPMGR.DLL and is due to the vulnerable DLL's failure to sanitize user-supplied data. A remote attacker or local authenticated user may exploit this to execute arbitrary code.
Affected Products
Microsoft Windows 2000 SP4, and XP SP1 and SP2.
Impact
System compromise: Remote code execution.
Recommended Actions
Apply the security patch to the system as given in the Microsoft Security Bulletin MS05-047.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |