MS09-049: Vulnerability in Wireless LAN AutoConfig Service Could Allow Remote Code Execution (970710)

This script is Copyright (C) 2009-2013 Tenable Network Security, Inc.


Synopsis :

Arbitrary code can be executed on the remote host through the Wireless
LAN AutoConfig Service.

Description :

A remote code execution vulnerability exists in the way that the
Wireless LAN AutoConfig Service (wlansvc) parses specific frames
received on the wireless network. This vulnerability could allow remote
code execution if a client or server with a wireless network interface
enabled receives specially crafted wireless frames. If a user is logged
on with administrative user rights, an attacker who successfully
exploited this vulnerability could take complete control of an affected
system.

See also :

http://technet.microsoft.com/en-us/security/bulletin/MS09-049

Solution :

Microsoft has released a set of patches for Windows Vista and 2008.

Risk factor :

High / CVSS Base Score : 8.3
(CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.1
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 40892 ()

Bugtraq ID: 36223

CVE ID: CVE-2009-1132