SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Microsoft)  >   Windows HTTP Services Vendors:   Microsoft
Windows HTTP Services Bugs Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1022041
SecurityTracker URL:  http://securitytracker.com/id/1022041
CVE Reference:   CVE-2009-0086, CVE-2009-0089, CVE-2009-0550   (Links to External Site)
Date:  Apr 14 2009
Impact:   Execution of arbitrary code via network, Modification of authentication information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2000 SP4, 2003 SP2, XP SP3, Vista SP1, 2008; and prior service packs
Description:   Several vulnerabilities were reported in Windows HTTP Services. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof web sites.

A remote user (web service) can return specially crafted data to the requesting target user or service to trigger flaws in Windows HTTP Services (WinHTTP) and execute arbitrary code on the target system. The code will run with the privileges of the target user or the target service using the WinHTTP API.

Specially crafted values can trigger an integer overflow [CVE-2009-0086]. Greg MacManus of iSIGHT Partners Labs reported this vulnerability.

A specially crafted distinguished name in a digital certificate, in combination with other other attacks such as DNS spoofing, may allow a remote user to spoof the digital certificate of a web site for the target application that uses the WinHTTP AIP [CVE-2009-0089]. Wan-Teh Chang and Cem Paya of Google reported this vulnerability.

A remote user can capture and replay the target user's user's NTLM logon credentials to execute arbitrary code on the target user's system [CVE-2009-0550].

Impact:   A remote user can execute arbitrary code on the target user's system.

A remote user can spoof web sites.

Solution:   The vendor has issued the following fixes:

Microsoft Windows 2000 Service Pack 4:

http://www.microsoft.com/downloads/details.aspx?familyid=39d5468e-5733-4c3e-9e75-3adac8ac8cb9

Windows XP Service Pack 2 and Windows XP Service Pack 3:

http://www.microsoft.com/downloads/details.aspx?familyid=35af4151-1858-4c9a-85e4-9ff45feca1a4

Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=49b16f0f-f6c3-4ca8-8041-392f4f7b5bbb

Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=42509f5a-d0f9-444a-9445-5eabdb555011

Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=7373ea32-bc2e-49f1-8b9f-4eeda5acc74c

Windows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium-based Systems:

http://www.microsoft.com/downloads/details.aspx?familyid=05e33cc5-cff6-4c71-be71-285f66a95e01

Windows Vista and Windows Vista Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?familyid=f071d770-3b6b-4040-9911-d4de8cde4c68

Windows Vista x64 Edition and Windows Vista x64 Edition Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?familyid=7ceef2d0-f316-48d1-aecc-d74f91cc5e1f

Windows Server 2008 for 32-bit Systems:

http://www.microsoft.com/downloads/details.aspx?familyid=4c36548f-c8c9-4318-91e2-9e0501339548

Windows Server 2008 for x64-based Systems:

http://www.microsoft.com/downloads/details.aspx?familyid=1c3f0997-a8a9-4340-ae0c-2c4d6792c65c

Windows Server 2008 for Itanium-based Systems:

http://www.microsoft.com/downloads/details.aspx?familyid=0885b3b0-b78e-4980-902d-dff3886bcaac

A restart is required.

The Microsoft advisory is available at:

http://www.microsoft.com/technet/security/bulletin/ms09-013.mspx

Vendor URL:  www.microsoft.com/technet/security/bulletin/ms09-013.mspx (Links to External Site)
Cause:   Boundary error, Input validation error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC