MS09-049: Vulnerability in Wireless LAN AutoConfig Service Could Allow Remote Code Execution (970710)

This script is Copyright (C) 2009-2017 Tenable Network Security, Inc.

Synopsis :

Arbitrary code can be executed on the remote host through the Wireless
LAN AutoConfig Service.

Description :

A remote code execution vulnerability exists in the way that the
Wireless LAN AutoConfig Service (wlansvc) parses specific frames
received on the wireless network. This vulnerability could allow remote
code execution if a client or server with a wireless network interface
enabled receives specially crafted wireless frames. If a user is logged
on with administrative user rights, an attacker who successfully
exploited this vulnerability could take complete control of an affected

See also :

Solution :

Microsoft has released a set of patches for Windows Vista and 2008.

Risk factor :

High / CVSS Base Score : 8.3
CVSS Temporal Score : 6.1
Public Exploit Available : false

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 40892 ()

Bugtraq ID: 36223

CVE ID: CVE-2009-1132

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now