MS09-013: Vulnerabilities in Windows HTTP Services Could Allow Remote Code Execution (960803)

This script is Copyright (C) 2009-2017 Tenable Network Security, Inc.

Synopsis :

The remote host contains an API that is affected by multiple

Description :

The version of Windows HTTP Services installed on the remote host is
affected by several vulnerabilities :

- An integer underflow triggered by a specially crafted
response from a malicious web server (for example,
during device discovery of UPnP devices on a network)
may allow for arbitrary code execution. (CVE-2009-0086)

- Incomplete validation of the distinguished name in a
digital certificate may, in combination with other
attacks, allow an attacker to successfully spoof the
digital certificate of a third-party website.

- A flaw in the way that Windows HTTP Services handles
NTLM credentials may allow an attacker to reflect back
a user's credentials and thereby gain access as that
user. (CVE-2009-0550)

See also :

Solution :

Microsoft has released a set of patches for Windows 2000, XP, 2003,
Vista and 2008.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.7
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 36151 ()

Bugtraq ID: 34435

CVE ID: CVE-2009-0086

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now