Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
NameCVE-2009-1546First vendor Publication2009-08-12
VendorCveLast vendor Modification2010-08-21

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:S/C:C/I:C/A:C)
Cvss Base Score8.5Attack RangeNetwork
Cvss Impact Score10Attack ComplexityMedium
Cvss Expoit Score6.8AuthenticationRequires single instance
Calculate full CVSS 2.0 Vectors scores

Security Protection

ImpactsProvides administrator access : Allows complete confidentiality, integrity, and availability violation; Allows unauthorized disclosure of information; Allows disruption of service.

Detail

Integer overflow in Avifil32.dll in the Windows Media file handling functionality in Microsoft Windows allows remote attackers to execute arbitrary code on a Windows 2000 SP4 system via a crafted AVI file, or cause a denial of service on a Windows XP SP2 or SP3, Server 2003 SP2, Vista Gold, SP1, or SP2, or Server 2008 Gold or SP2 system via a crafted AVI file, aka "AVI Integer Overflow Vulnerability."

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1546

CWE : Common Weakness Enumeration

idName
CWE-189Numeric Errors (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:5930
 
Oval ID: oval:org.mitre.oval:def:5930
Title: AVI Integer Overflow Vulnerability
Description: Integer overflow in Avifil32.dll in the Windows Media file handling functionality in Microsoft Windows allows remote attackers to execute arbitrary code on a Windows 2000 SP4 system via a crafted AVI file, or cause a denial of service on a Windows XP SP2 or SP3, Server 2003 SP2, Vista Gold, SP1, or SP2, or Server 2008 Gold or SP2 system via a crafted AVI file, aka "AVI Integer Overflow Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2009-1546
Version: 1
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os3
Os6
Os3
Os3

OpenVAS Exploits

DateDescription
2009-08-12Name : Microsoft Windows AVI Media File Parsing Vulnerabilities (971557)
File : nvt/secpod_ms09-038.nasl

Open Source Vulnerability Database (OSVDB)

idDescription
56909Microsoft Windows AVI Media File Parsing Unspecified Overflow

Snort® IPS/IDS

DateDescription
2014-01-10Microsoft Windows AVIFile truncated media file processing memory corruption a...
RuleID : 23569 - Revision : 4 - Type : FILE-MULTIMEDIA
2014-01-10Microsoft Windows AVIFile media file processing memory corruption attempt
RuleID : 23568 - Revision : 4 - Type : FILE-MULTIMEDIA
2014-01-10Microsoft Windows AVI Header insufficient data corruption attempt
RuleID : 23567 - Revision : 4 - Type : FILE-MULTIMEDIA
2014-01-10Microsoft Windows AVI Header insufficient data corruption attempt
RuleID : 19320 - Revision : 9 - Type : FILE-MULTIMEDIA
2014-01-10Microsoft Windows AVIFile truncated media file processing memory corruption a...
RuleID : 16342 - Revision : 13 - Type : FILE-MULTIMEDIA
2014-01-10Microsoft Windows AVIFile media file invalid header length
RuleID : 15857 - Revision : 6 - Type : FILE-MULTIMEDIA
2014-01-10Microsoft Windows AVIFile media file processing memory corruption attempt
RuleID : 15854 - Revision : 14 - Type : FILE-MULTIMEDIA

Nessus® Vulnerability Scanner

DateDescription
2009-08-11Name : Arbitrary code can be executed on the remote host through Windows Media file ...
File : smb_nt_ms09-038.nasl - Type : ACT_GATHER_INFO

Internal Sources (Detail)

SourceUrl
BIDhttp://www.securityfocus.com/bid/35970
CERThttp://www.us-cert.gov/cas/techalerts/TA09-223A.html
MShttp://www.microsoft.com/technet/security/Bulletin/MS09-038.mspx
OSVDBhttp://osvdb.org/56909
SECTRACKhttp://www.securitytracker.com/id?1022711
SECUNIAhttp://secunia.com/advisories/36206
VUPENhttp://www.vupen.com/english/advisories/2009/2233

Alert History

If you want to see full details history, please login or register.
0
1
2
DateInformations
2014-02-17 10:49:55
  • Multiple Updates
2014-01-19 21:25:54
  • Multiple Updates
2013-05-10 23:49:49
  • Multiple Updates