Security Updates for Microsoft Windows VP9 Video Extensions Library (July 2023)

medium Nessus Plugin ID 178241

Synopsis

The Windows app installed on the remote host is affected by an information disclosure vulnerability.

Description

The Windows 'VP9 Extensions' app installed on the remote host is affected by an information disclosure vulnerability. An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.
Exploitation of the vulnerability requires that an attacker must send the user a malicious file and convince them to open it.

Solution

Upgrade to app version 1.0.61591.0, or later via the Microsoft Store.

See Also

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36872

Plugin Details

Severity: Medium

ID: 178241

File Name: smb_nt_ms23_jul_vp9.nasl

Version: 1.4

Type: local

Agent: windows

Family: Windows

Published: 7/13/2023

Updated: 3/27/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.9

Temporal Score: 3.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:N/A:N

CVSS Score Source: CVE-2023-36872

CVSS v3

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/Registry/Enumerated, WMI/Windows App Store/Enumerated

Exploit Ease: No known exploits are available

Patch Publication Date: 7/11/2023

Vulnerability Publication Date: 7/11/2023

Reference Information

CVE: CVE-2023-36872

IAVA: 2023-A-0345-S