Summary
This host is missing a critical security update according to Microsoft Bulletin MS09-013.
Impact
Attacker who successfully exploited could allow malicious people to conduct spoofing attacks and compromise a user's system.
Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://www.microsoft.com/technet/security/bulletin/ms09-013.mspx
Insight
- Integer underflow error in Windows HTTP Services allow to execute arbitrary code via a specially crafted parameter returned by a malicious web server.
- Error in Windows HTTP Services while validating the distinguished name of a certificate can leads to spoof a valid certificate.
Successful exploitation requires the ability to perform DNS spoofing attacks.
- Error in Windows HTTP Services reflect NTLM credentials and execute arbitrary code by tricking a user into connecting to a malicious web server.
Affected
Microsoft Windows 2K Service Pack 4 and prior.
Microsoft Windows XP Service Pack 3 and prior.
Microsoft Windows 2003 Service Pack 2 and prior.
Microsoft Windows Vista Service Pack 1 and prior.
Microsoft Windows Server 2008 Service Pack 1 and prior.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2009-0086, CVE-2009-0089, CVE-2009-0550 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft .NET Framework Remote Code Execution Vulnerability (2693777)
- Microsoft .NET Framework and Microsoft Silverlight Remote Code Execution Vulnerabilities (2651026)
- Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (961371))
- Microsoft Active Directory Denial of Service Vulnerability (953235)
- IE 5.01 5.5 6.0 Cumulative patch (890923)