MS09-013: Vulnerabilities in Windows HTTP Services Could Allow Remote Code Execution (960803)

This script is Copyright (C) 2009-2014 Tenable Network Security, Inc.


Synopsis :

The remote host contains an API that is affected by multiple
vulnerabilities.

Description :

The version of Windows HTTP Services installed on the remote host is
affected by several vulnerabilities :

- An integer underflow triggered by a specially crafted
response from a malicious web server (for example,
during device discovery of UPnP devices on a network)
may allow for arbitrary code execution. (CVE-2009-0086)

- Incomplete validation of the distinguished name in a
digital certificate may, in combination with other
attacks, allow an attacker to successfully spoof the
digital certificate of a third-party website.
(CVE-2009-0089)

- A flaw in the way that Windows HTTP Services handles
NTLM credentials may allow an attacker to reflect back
a user's credentials and thereby gain access as that
user. (CVE-2009-0550)

See also :

http://technet.microsoft.com/en-us/security/bulletin/MS09-013

Solution :

Microsoft has released a set of patches for Windows 2000, XP, 2003,
Vista and 2008.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.7
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 36151 ()

Bugtraq ID: 34435
34437
34439

CVE ID: CVE-2009-0086
CVE-2009-0089
CVE-2009-0550