MS05-039: Vulnerability in Plug and Play Service Could Allow Remote Code Execution (899588) (uncredentialed check)

critical Nessus Plugin ID 19408


Arbitrary code can be executed on the remote host due to a flaw in the Plug-And-Play service.


The remote version of Windows contains a flaw in the function 'PNP_QueryResConfList()' in the Plug and Play service that may allow an attacker to execute arbitrary code on the remote host with SYSTEM privileges.

A series of worms (Zotob) are known to exploit this vulnerability in the wild.


Microsoft has released a set of patches for Windows 2000, XP and 2003.

See Also

Plugin Details

Severity: Critical

ID: 19408

File Name: smb_kb899588.nasl

Version: 1.43

Type: local

Agent: windows

Family: Windows

Published: 8/9/2005

Updated: 11/15/2018

Supported Sensors: Nessus Agent

Risk Information


Risk Factor: High

Score: 7.4


Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: x-cpe:/a:microsoft:windows:pnpsvr, cpe:/o:microsoft:windows

Required KB Items: Host/OS/smb

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 8/9/2005

Exploitable With


Core Impact

Metasploit (MS05-039 Microsoft Plug and Play Service Overflow)

Reference Information

CVE: CVE-2005-1983

BID: 14513

MSFT: MS05-039

MSKB: 899588