First published: Thu Sep 01 2005(Updated: )
The user interface in the Windows Firewall does not properly display certain malformed entries in the Windows Registry, which makes it easier for attackers with administrator privileges to hide activities if the administrator only uses the Windows Firewall interface to monitor exceptions. NOTE: the vendor disputes this issue, saying that since administrative privileges are already required, it is not a vulnerability. CVE has not yet formally decided if such "information hiding" issues should be included.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server 2003 | =64-bit | |
Microsoft Windows XP | ||
Microsoft Windows Server 2003 | =sp1 | |
Microsoft Windows XP | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2765 is considered a moderate severity vulnerability as it allows attackers with administrator privileges to conceal their activities.
CVE-2005-2765 affects the Windows Firewall by improperly displaying malformed registry entries, which can hinder proper monitoring.
CVE-2005-2765 impacts Microsoft Windows 2003 Server and Windows XP including specific updates like SP1 and SP2.
Mitigating CVE-2005-2765 involves regularly updating the operating system and monitoring for any unusual activity in the firewall configuration.
There are no confirmed active exploits for CVE-2005-2765, but its potential for abuse makes it important to manage.