MS09-038: Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution (971557)

This script is Copyright (C) 2009-2017 Tenable Network Security, Inc.

Synopsis :

Arbitrary code can be executed on the remote host through Windows Media
file processing.

Description :

The remote Windows host is affected by two vulnerabilities involving
the way in which AVI headers are processed and AVI data is validated
that could be abused to execute arbitrary code remotely.

If an attacker can trick a user on the affected system into opening a
specially crafted AVI file, these issues could be leveraged to execute
arbitrary code subject to the user's privileges.

See also :

Solution :

Microsoft has released a set of patches for Windows 2000, XP, 2003,
Vista and 2008.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.3
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 40557 ()

Bugtraq ID: 35967

CVE ID: CVE-2009-1545

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now