Stack-based buffer overflow in the Universal Plug and Play (UPnP) service in Microsoft Windows XP SP2 allows remote attackers on the same subnet to execute arbitrary code via crafted HTTP headers in request or notification messages, which trigger memory corruption.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2049
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-019
http://www.vupen.com/english/advisories/2007/1323
http://www.securitytracker.com/id?1017895
http://www.securityfocus.com/bid/23371
http://www.securityfocus.com/archive/1/466331/100/200/threaded
http://secunia.com/advisories/24822
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=509