### [CVE-2005-1983](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1983) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen) ### Description Stack-based buffer overflow in the Plug and Play (PnP) service for Microsoft Windows 2000 and Windows XP Service Pack 1 allows remote attackers to execute arbitrary code via a crafted packet, and local users to gain privileges via a malicious application, as exploited by the Zotob (aka Mytob) worm. ### POC #### Reference - http://www.securiteam.com/windowsntfocus/5YP0E00GKW.html - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-039 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/Al1ex/WindowsElevation - https://github.com/Ascotbe/Kernelhub - https://github.com/Cruxer8Mech/Idk - https://github.com/fei9747/WindowsElevation - https://github.com/makoto56/penetration-suite-toolkit - https://github.com/ycdxsb/WindowsPrivilegeEscalation