MS09-038: Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution (971557)

high Nessus Plugin ID 40557

Synopsis

Arbitrary code can be executed on the remote host through Windows Media file processing.

Description

The remote Windows host is affected by two vulnerabilities involving the way in which AVI headers are processed and AVI data is validated that could be abused to execute arbitrary code remotely.

If an attacker can trick a user on the affected system into opening a specially crafted AVI file, these issues could be leveraged to execute arbitrary code subject to the user's privileges.

Solution

Microsoft has released a set of patches for Windows 2000, XP, 2003, Vista and 2008.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2009/ms09-038

Plugin Details

Severity: High

ID: 40557

File Name: smb_nt_ms09-038.nasl

Version: 1.23

Type: local

Agent: windows

Published: 8/11/2009

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Ease: No known exploits are available

Patch Publication Date: 8/11/2009

Vulnerability Publication Date: 8/11/2009

Reference Information

CVE: CVE-2009-1545, CVE-2009-1546

BID: 35967, 35970

CWE: 189, 94

MSFT: MS09-038

MSKB: 971557