MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution (975682)

high Nessus Plugin ID 42107

Synopsis

Arbitrary code can be executed on the remote host through opening a Windows Media Format file.

Description

The remote Windows host contains a version of the Windows Media Runtime that is affected by multiple vulnerabilities :

- The ASF parser incorrectly parses files which make use of the Window Media Speech codec. A remote attacker can exploit this by tricking a user into opening a specially crafted ASF file, which can lead to arbitrary code execution. (CVE-2009-0555)

- The Audio Compression Manager does not properly initialize certain functions in compressed audio files. A remote attacker can exploit this by tricking a user into opening a specially crafted media file, which can lead to arbitrary code execution. (CVE-2009-2525)

Solution

Microsoft has released a set of patches for Windows 2000, XP, 2003, Vista and 2008.

See Also

https://www.nessus.org/u?07bcab7d

Plugin Details

Severity: High

ID: 42107

File Name: smb_nt_ms09-051.nasl

Version: 1.28

Type: local

Agent: windows

Published: 10/13/2009

Updated: 8/5/2020

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/13/2009

Vulnerability Publication Date: 10/13/2009

Exploitable With

CANVAS (CANVAS)

Core Impact

Reference Information

CVE: CVE-2009-0555, CVE-2009-2525

BID: 36602, 36614

CWE: 94

IAVA: 2009-A-0091-S

MSFT: MS09-051

MSKB: 954155, 969878, 975025