Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2009-0086 | First vendor Publication | 2009-04-15 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Integer underflow in Windows HTTP Services (aka WinHTTP) in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote HTTP servers to execute arbitrary code via crafted parameter values in a response, related to error handling, aka "Windows HTTP Services Integer Underflow Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0086 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:6149 | |||
Oval ID: | oval:org.mitre.oval:def:6149 | ||
Title: | Windows HTTP Services Integer Underflow Vulnerability | ||
Description: | Integer underflow in Windows HTTP Services (aka WinHTTP) in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote HTTP servers to execute arbitrary code via crafted parameter values in a response, related to error handling, aka "Windows HTTP Services Integer Underflow Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2009-0086 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 | |
Os | 4 | |
Os | 4 | |
Os | 4 | |
Os | 2 |
OpenVAS Exploits
Date | Description |
---|---|
2009-04-15 | Name : Windows HTTP Services Could Allow Remote Code Execution Vulnerabilities (960803) File : nvt/secpod_ms09-013.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
53620 | Microsoft Windows HTTP Services Web Server Response Unspecified Integer Under... A memory corruption flaw exists in Windows. WinHTTP.dll fails to properly parse the HTTP chunksize parameter resulting in an integer underflow. With a specially crafted HTTP response, a context-dependent attacker can cause arbitrary code execution, resulting in a loss of integrity. |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2009-04-19 | IAVM : 2009-A-0034 - Microsoft Windows HTTP Services Remote Code Execution Vulnerability Severity : Category I - VMSKEY : V0018756 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | possible SMB replay attempt - overlapping encryption keys detected RuleID : 17723 - Revision : 12 - Type : OS-WINDOWS |
2014-01-10 | Telnet-based NTLM replay attack attempt RuleID : 15847 - Revision : 14 - Type : OS-WINDOWS |
2014-01-10 | Multiple web browsers HTTP chunked transfer-encoding memory corruption attempt RuleID : 15462 - Revision : 20 - Type : BROWSER-OTHER |
2014-01-10 | WinHTTP SSL/TLS impersonation attempt RuleID : 15456 - Revision : 6 - Type : SERVER-OTHER |
2014-01-10 | SMB replay attempt via NTLMSSP - overlapping encryption keys detected RuleID : 15453 - Revision : 16 - Type : OS-WINDOWS |
2014-01-10 | Web-based NTLM replay attack attempt RuleID : 15124 - Revision : 17 - Type : OS-WINDOWS |
2014-01-10 | possible SMB replay attempt - overlapping encryption keys detected RuleID : 15009 - Revision : 22 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-04-15 | Name : The remote host contains an API that is affected by multiple vulnerabilities. File : smb_nt_ms09-013.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:11:36 |
|
2024-11-28 12:18:03 |
|
2023-12-07 21:28:06 |
|
2021-05-04 12:09:00 |
|
2021-04-22 01:09:20 |
|
2020-05-23 00:23:12 |
|
2019-02-26 17:19:31 |
|
2018-10-13 00:22:46 |
|
2017-09-29 09:24:01 |
|
2016-06-28 17:33:19 |
|
2016-04-26 18:33:02 |
|
2014-02-17 10:48:16 |
|
2014-01-19 21:25:33 |
|
2013-11-11 12:38:09 |
|
2013-05-10 23:41:47 |
|