This script is Copyright (C) 2009-2015 Tenable Network Security, Inc.
Arbitrary code can be executed on the remote host through the Wireless
LAN AutoConfig Service.
A remote code execution vulnerability exists in the way that the
Wireless LAN AutoConfig Service (wlansvc) parses specific frames
received on the wireless network. This vulnerability could allow remote
code execution if a client or server with a wireless network interface
enabled receives specially crafted wireless frames. If a user is logged
on with administrative user rights, an attacker who successfully
exploited this vulnerability could take complete control of an affected
See also :
Microsoft has released a set of patches for Windows Vista and 2008.
Risk factor :
High / CVSS Base Score : 8.3
CVSS Temporal Score : 6.1
Public Exploit Available : false
Family: Windows : Microsoft Bulletins
Nessus Plugin ID: 40892 ()
Bugtraq ID: 36223
CVE ID: CVE-2009-1132
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.