MS09-049: Vulnerability in Wireless LAN AutoConfig Service Could Allow Remote Code Execution (970710)

high Nessus Plugin ID 40892

Synopsis

Arbitrary code can be executed on the remote host through the Wireless LAN AutoConfig Service.

Description

A remote code execution vulnerability exists in the way that the Wireless LAN AutoConfig Service (wlansvc) parses specific frames received on the wireless network. This vulnerability could allow remote code execution if a client or server with a wireless network interface enabled receives specially crafted wireless frames. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system.

Solution

Microsoft has released a set of patches for Windows Vista and 2008.

See Also

https://www.nessus.org/u?526b78db

Plugin Details

Severity: High

ID: 40892

File Name: smb_nt_ms09-049.nasl

Version: 1.23

Type: local

Agent: windows

Published: 9/8/2009

Updated: 8/5/2020

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 8.3

Temporal Score: 6.1

Vector: CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2009-1132

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Ease: No known exploits are available

Patch Publication Date: 9/8/2009

Vulnerability Publication Date: 9/8/2009

Reference Information

CVE: CVE-2009-1132

BID: 36223

CWE: 119

IAVA: 2009-A-0078-S

MSFT: MS09-049

MSKB: 970710