MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution (975682)

This script is Copyright (C) 2009-2013 Tenable Network Security, Inc.


Synopsis :

Arbitrary code can be executed on the remote host through opening a
Windows Media Format file.

Description :

The remote Windows host contains a version of the Windows Media Runtime
that is affected by multiple vulnerabilities :

- The ASF parser incorrectly parses files which make use
of the Window Media Speech codec. A remote attacker can
exploit this by tricking a user into opening a specially
crafted ASF file, which can lead to arbitrary code
execution. (CVE-2009-0555)

- The Audio Compression Manager does not properly initialize
certain functions in compressed audio files. A remote
attacker can exploit this by tricking a user into opening
a specially crafted media file, which can lead to
arbitrary code execution. (CVE-2009-2525)

See also :

http://technet.microsoft.com/en-us/security/bulletin/MS09-051

Solution :

Microsoft has released a set of patches for Windows 2000, XP, 2003,
Vista and 2008.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.3
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 42107 ()

Bugtraq ID: 36602
36614

CVE ID: CVE-2009-0555
CVE-2009-2525