MS09-038: Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution (971557)

This script is Copyright (C) 2009-2014 Tenable Network Security, Inc.


Synopsis :

Arbitrary code can be executed on the remote host through Windows Media
file processing.

Description :

The remote Windows host is affected by two vulnerabilities involving
the way in which AVI headers are processed and AVI data is validated
that could be abused to execute arbitrary code remotely.

If an attacker can trick a user on the affected system into opening a
specially crafted AVI file, these issues could be leveraged to execute
arbitrary code subject to the user's privileges.

See also :

http://technet.microsoft.com/en-us/security/bulletin/MS09-038

Solution :

Microsoft has released a set of patches for Windows 2000, XP, 2003,
Vista and 2008.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.3
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 40557 ()

Bugtraq ID: 35967
35970

CVE ID: CVE-2009-1545
CVE-2009-1546