{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2005-12-27T00:00:00.000Z","descriptions":[{"lang":"en","value":"The Windows Graphical Device Interface library (GDI32.DLL) in Microsoft Windows allows remote attackers to execute arbitrary code via a Windows Metafile (WMF) format image with a crafted SETABORTPROC GDI Escape function call, related to the Windows Picture and Fax Viewer (SHIMGVW.DLL), a different vulnerability than CVE-2005-2123 and CVE-2005-2124, and as originally discovered in the wild on unionseek.com."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-19T14:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"tags":["x_refsource_MISC"],"url":"http://vil.mcafeesecurity.com/vil/content/v_137760.htm"},{"name":"20051228 Re: Is this a new exploit?","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/420367/100/0/threaded"},{"tags":["x_refsource_MISC"],"url":"http://www.f-secure.com/weblog/archives/archive-122005.html#00000753"},{"name":"20051228 WMF Exploit","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/420378/100/0/threaded"},{"name":"oval:org.mitre.oval:def:1492","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1492"},{"name":"20051228 RE: [Full-disclosure] Someone wasted a nice bug on spyware...","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/420357/100/0/threaded"},{"name":"oval:org.mitre.oval:def:1564","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1564"},{"name":"18255","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18255"},{"name":"oval:org.mitre.oval:def:1612","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1612"},{"name":"ADV-2005-3086","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2005/3086"},{"name":"1015416","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1015416"},{"name":"20051227 Exploitation of Windows WMF on the web","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/420351/100/0/threaded"},{"name":"20051229 WMF exploit","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/420446/100/0/threaded"},{"name":"win-wmf-execute-code(23846)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/23846"},{"name":"18364","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18364"},{"name":"20060104 Another WMF exploit workaround","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/420773/100/0/threaded"},{"name":"18415","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18415"},{"name":"20060101 Re: RE: WMF Exploit","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/420664/30/7730/threaded"},{"name":"20060103 Re: [funsec] WMF round-up, updates and de-mystification","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/420687/100/0/threaded"},{"name":"20060103 WMF round-up, updates and de-mystification","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/420682/100/0/threaded"},{"name":"18311","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18311"},{"name":"TA05-362A","tags":["third-party-advisory","x_refsource_CERT"],"url":"http://www.us-cert.gov/cas/techalerts/TA05-362A.html"},{"tags":["x_refsource_MISC"],"url":"http://linuxbox.org/pipermail/funsec/2006-January/002455.html"},{"name":"20051229 RE: WMF Exploit","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/420546/30/7730/threaded"},{"name":"oval:org.mitre.oval:def:1431","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1431"},{"name":"20051227 Is this a new exploit?","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/420288/100/0/threaded"},{"name":"VU#181038","tags":["third-party-advisory","x_refsource_CERT-VN"],"url":"http://www.kb.cert.org/vuls/id/181038"},{"name":"oval:org.mitre.oval:def:1460","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1460"},{"name":"16074","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/16074"},{"tags":["x_refsource_MISC"],"url":"http://www130.nortelnetworks.com/cgi-bin/eserv/cs/main.jsp?cscat=BLTNDETAIL&DocumentOID=375341"},{"name":"MS06-001","tags":["vendor-advisory","x_refsource_MS"],"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-001"},{"name":"20060103 WMF SETABORTPROC exploit","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/420684/100/0/threaded"},{"name":"oval:org.mitre.oval:def:1433","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1433"},{"name":"TA06-005A","tags":["third-party-advisory","x_refsource_CERT"],"url":"http://www.us-cert.gov/cas/techalerts/TA06-005A.html"},{"tags":["x_refsource_MISC"],"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-001.htm"},{"tags":["x_refsource_MISC"],"url":"http://www.microsoft.com/technet/security/advisory/912840.mspx"},{"tags":["x_refsource_MISC"],"url":"http://www130.nortelnetworks.com/cgi-bin/eserv/cs/main.jsp?cscat=BLTNDETAIL&DocumentOID=375420"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2005-4560","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Windows Graphical Device Interface library (GDI32.DLL) in Microsoft Windows allows remote attackers to execute arbitrary code via a Windows Metafile (WMF) format image with a crafted SETABORTPROC GDI Escape function call, related to the Windows Picture and Fax Viewer (SHIMGVW.DLL), a different vulnerability than CVE-2005-2123 and CVE-2005-2124, and as originally discovered in the wild on unionseek.com."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"http://vil.mcafeesecurity.com/vil/content/v_137760.htm","refsource":"MISC","url":"http://vil.mcafeesecurity.com/vil/content/v_137760.htm"},{"name":"20051228 Re: Is this a new exploit?","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/420367/100/0/threaded"},{"name":"http://www.f-secure.com/weblog/archives/archive-122005.html#00000753","refsource":"MISC","url":"http://www.f-secure.com/weblog/archives/archive-122005.html#00000753"},{"name":"20051228 WMF Exploit","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/420378/100/0/threaded"},{"name":"oval:org.mitre.oval:def:1492","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1492"},{"name":"20051228 RE: [Full-disclosure] Someone wasted a nice bug on spyware...","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/420357/100/0/threaded"},{"name":"oval:org.mitre.oval:def:1564","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1564"},{"name":"18255","refsource":"SECUNIA","url":"http://secunia.com/advisories/18255"},{"name":"oval:org.mitre.oval:def:1612","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1612"},{"name":"ADV-2005-3086","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2005/3086"},{"name":"1015416","refsource":"SECTRACK","url":"http://securitytracker.com/id?1015416"},{"name":"20051227 Exploitation of Windows WMF on the web","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/420351/100/0/threaded"},{"name":"20051229 WMF exploit","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/420446/100/0/threaded"},{"name":"win-wmf-execute-code(23846)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/23846"},{"name":"18364","refsource":"SECUNIA","url":"http://secunia.com/advisories/18364"},{"name":"20060104 Another WMF exploit workaround","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/420773/100/0/threaded"},{"name":"18415","refsource":"SECUNIA","url":"http://secunia.com/advisories/18415"},{"name":"20060101 Re: RE: WMF Exploit","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/420664/30/7730/threaded"},{"name":"20060103 Re: [funsec] WMF round-up, updates and de-mystification","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/420687/100/0/threaded"},{"name":"20060103 WMF round-up, updates and de-mystification","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/420682/100/0/threaded"},{"name":"18311","refsource":"SECUNIA","url":"http://secunia.com/advisories/18311"},{"name":"TA05-362A","refsource":"CERT","url":"http://www.us-cert.gov/cas/techalerts/TA05-362A.html"},{"name":"http://linuxbox.org/pipermail/funsec/2006-January/002455.html","refsource":"MISC","url":"http://linuxbox.org/pipermail/funsec/2006-January/002455.html"},{"name":"20051229 RE: WMF Exploit","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/420546/30/7730/threaded"},{"name":"oval:org.mitre.oval:def:1431","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1431"},{"name":"20051227 Is this a new exploit?","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/420288/100/0/threaded"},{"name":"VU#181038","refsource":"CERT-VN","url":"http://www.kb.cert.org/vuls/id/181038"},{"name":"oval:org.mitre.oval:def:1460","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1460"},{"name":"16074","refsource":"BID","url":"http://www.securityfocus.com/bid/16074"},{"name":"http://www130.nortelnetworks.com/cgi-bin/eserv/cs/main.jsp?cscat=BLTNDETAIL&DocumentOID=375341","refsource":"MISC","url":"http://www130.nortelnetworks.com/cgi-bin/eserv/cs/main.jsp?cscat=BLTNDETAIL&DocumentOID=375341"},{"name":"MS06-001","refsource":"MS","url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-001"},{"name":"20060103 WMF SETABORTPROC exploit","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/420684/100/0/threaded"},{"name":"oval:org.mitre.oval:def:1433","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1433"},{"name":"TA06-005A","refsource":"CERT","url":"http://www.us-cert.gov/cas/techalerts/TA06-005A.html"},{"name":"http://support.avaya.com/elmodocs2/security/ASA-2006-001.htm","refsource":"MISC","url":"http://support.avaya.com/elmodocs2/security/ASA-2006-001.htm"},{"name":"http://www.microsoft.com/technet/security/advisory/912840.mspx","refsource":"MISC","url":"http://www.microsoft.com/technet/security/advisory/912840.mspx"},{"name":"http://www130.nortelnetworks.com/cgi-bin/eserv/cs/main.jsp?cscat=BLTNDETAIL&DocumentOID=375420","refsource":"MISC","url":"http://www130.nortelnetworks.com/cgi-bin/eserv/cs/main.jsp?cscat=BLTNDETAIL&DocumentOID=375420"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-07T23:46:05.551Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"http://vil.mcafeesecurity.com/vil/content/v_137760.htm"},{"name":"20051228 Re: Is this a new exploit?","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/420367/100/0/threaded"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.f-secure.com/weblog/archives/archive-122005.html#00000753"},{"name":"20051228 WMF Exploit","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/420378/100/0/threaded"},{"name":"oval:org.mitre.oval:def:1492","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1492"},{"name":"20051228 RE: [Full-disclosure] Someone wasted a nice bug on spyware...","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/420357/100/0/threaded"},{"name":"oval:org.mitre.oval:def:1564","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1564"},{"name":"18255","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18255"},{"name":"oval:org.mitre.oval:def:1612","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1612"},{"name":"ADV-2005-3086","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2005/3086"},{"name":"1015416","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1015416"},{"name":"20051227 Exploitation of Windows WMF on the web","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/420351/100/0/threaded"},{"name":"20051229 WMF exploit","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/420446/100/0/threaded"},{"name":"win-wmf-execute-code(23846)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/23846"},{"name":"18364","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18364"},{"name":"20060104 Another WMF exploit workaround","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/420773/100/0/threaded"},{"name":"18415","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18415"},{"name":"20060101 Re: RE: WMF Exploit","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/420664/30/7730/threaded"},{"name":"20060103 Re: [funsec] WMF round-up, updates and de-mystification","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/420687/100/0/threaded"},{"name":"20060103 WMF round-up, updates and de-mystification","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/420682/100/0/threaded"},{"name":"18311","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18311"},{"name":"TA05-362A","tags":["third-party-advisory","x_refsource_CERT","x_transferred"],"url":"http://www.us-cert.gov/cas/techalerts/TA05-362A.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://linuxbox.org/pipermail/funsec/2006-January/002455.html"},{"name":"20051229 RE: WMF Exploit","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/420546/30/7730/threaded"},{"name":"oval:org.mitre.oval:def:1431","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1431"},{"name":"20051227 Is this a new exploit?","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/420288/100/0/threaded"},{"name":"VU#181038","tags":["third-party-advisory","x_refsource_CERT-VN","x_transferred"],"url":"http://www.kb.cert.org/vuls/id/181038"},{"name":"oval:org.mitre.oval:def:1460","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1460"},{"name":"16074","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/16074"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www130.nortelnetworks.com/cgi-bin/eserv/cs/main.jsp?cscat=BLTNDETAIL&DocumentOID=375341"},{"name":"MS06-001","tags":["vendor-advisory","x_refsource_MS","x_transferred"],"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-001"},{"name":"20060103 WMF SETABORTPROC exploit","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/420684/100/0/threaded"},{"name":"oval:org.mitre.oval:def:1433","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1433"},{"name":"TA06-005A","tags":["third-party-advisory","x_refsource_CERT","x_transferred"],"url":"http://www.us-cert.gov/cas/techalerts/TA06-005A.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-001.htm"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.microsoft.com/technet/security/advisory/912840.mspx"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www130.nortelnetworks.com/cgi-bin/eserv/cs/main.jsp?cscat=BLTNDETAIL&DocumentOID=375420"}]}]},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2005-4560","datePublished":"2005-12-28T19:00:00.000Z","dateReserved":"2005-12-28T00:00:00.000Z","dateUpdated":"2024-08-07T23:46:05.551Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}