Windows HTTP Services Bugs Let Remote Users Execute Arbitrary Code
|
SecurityTracker Alert ID: 1022041 |
SecurityTracker URL: http://securitytracker.com/id/1022041
|
CVE Reference:
CVE-2009-0086, CVE-2009-0089, CVE-2009-0550
(Links to External Site)
|
Date: Apr 14 2009
|
Impact:
Execution of arbitrary code via network, Modification of authentication information, User access via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 2000 SP4, 2003 SP2, XP SP3, Vista SP1, 2008; and prior service packs
|
Description:
Several vulnerabilities were reported in Windows HTTP Services. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof web sites.
A remote user (web service) can return specially crafted data to the requesting target user or service to trigger flaws in Windows HTTP Services (WinHTTP) and execute arbitrary code on the target system. The code will run with the privileges of the target user or the target service using the WinHTTP API.
Specially crafted values can trigger an integer overflow [CVE-2009-0086]. Greg MacManus of iSIGHT Partners Labs reported this vulnerability.
A specially crafted distinguished name in a digital certificate, in combination with other other attacks such as DNS spoofing, may allow a remote user to spoof the digital certificate of a web site for the target application that uses the WinHTTP AIP [CVE-2009-0089]. Wan-Teh Chang and Cem Paya of Google reported this vulnerability.
A remote user can capture and replay the target user's user's NTLM logon credentials to execute arbitrary code on the target user's system [CVE-2009-0550].
|
Impact:
A remote user can execute arbitrary code on the target user's system.
A remote user can spoof web sites.
|
Solution:
The vendor has issued the following fixes:
Microsoft Windows 2000 Service Pack 4:
http://www.microsoft.com/downloads/details.aspx?familyid=39d5468e-5733-4c3e-9e75-3adac8ac8cb9
Windows XP Service Pack 2 and Windows XP Service Pack 3:
http://www.microsoft.com/downloads/details.aspx?familyid=35af4151-1858-4c9a-85e4-9ff45feca1a4
Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?familyid=49b16f0f-f6c3-4ca8-8041-392f4f7b5bbb
Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?familyid=42509f5a-d0f9-444a-9445-5eabdb555011
Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?familyid=7373ea32-bc2e-49f1-8b9f-4eeda5acc74c
Windows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium-based Systems:
http://www.microsoft.com/downloads/details.aspx?familyid=05e33cc5-cff6-4c71-be71-285f66a95e01
Windows Vista and Windows Vista Service Pack 1:
http://www.microsoft.com/downloads/details.aspx?familyid=f071d770-3b6b-4040-9911-d4de8cde4c68
Windows Vista x64 Edition and Windows Vista x64 Edition Service Pack 1:
http://www.microsoft.com/downloads/details.aspx?familyid=7ceef2d0-f316-48d1-aecc-d74f91cc5e1f
Windows Server 2008 for 32-bit Systems:
http://www.microsoft.com/downloads/details.aspx?familyid=4c36548f-c8c9-4318-91e2-9e0501339548
Windows Server 2008 for x64-based Systems:
http://www.microsoft.com/downloads/details.aspx?familyid=1c3f0997-a8a9-4340-ae0c-2c4d6792c65c
Windows Server 2008 for Itanium-based Systems:
http://www.microsoft.com/downloads/details.aspx?familyid=0885b3b0-b78e-4980-902d-dff3886bcaac
A restart is required.
The Microsoft advisory is available at:
http://www.microsoft.com/technet/security/bulletin/ms09-013.mspx
|
Vendor URL: www.microsoft.com/technet/security/bulletin/ms09-013.mspx (Links to External Site)
|
Cause:
Boundary error, Input validation error
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|