Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2009-1132 | First vendor Publication | 2009-09-08 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Heap-based buffer overflow in the Wireless LAN AutoConfig Service (aka Wlansvc) in Microsoft Windows Vista Gold, SP1, and SP2 and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a malformed wireless frame, aka "Wireless Frame Parsing Remote Code Execution Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1132 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:6389 | |||
Oval ID: | oval:org.mitre.oval:def:6389 | ||
Title: | Wireless Frame Parsing Remote Code Execution Vulnerability | ||
Description: | Heap-based buffer overflow in the Wireless LAN AutoConfig Service (aka Wlansvc) in Microsoft Windows Vista Gold, SP1, and SP2 and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a malformed wireless frame, aka "Wireless Frame Parsing Remote Code Execution Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2009-1132 | Version: | 3 |
Platform(s): | Microsoft Windows Vista Microsoft Windows Server 2008 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2010-12-06 | Name : Microsoft Wireless LAN AutoConfig Service Remote Code Execution Vulnerabilit... File : nvt/gb_ms09-049.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
57806 | Microsoft Windows Wireless LAN AutoConfig Service (wlansvc) Frame Parsing Arb... The vulnerability is caused due to an unspecified error in the Wireless LAN AutoConfig Service (wlansvc) when parsing certain wireless network frames. This can be exploited to cause a heap-based buffer overflow via a specially crafted frame received on the wireless network interface. |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2009-09-10 | IAVM : 2009-A-0078 - Microsoft Wireless LAN AutoConfig Service Vulnerability Severity : Category I - VMSKEY : V0019913 |
2009-09-10 | IAVM : 2009-A-0077 - Multiple Microsoft TCP/IP Remote Code Execution Vulnerabilities Severity : Category I - VMSKEY : V0019917 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-09-08 | Name : Arbitrary code can be executed on the remote host through the Wireless LAN Au... File : smb_nt_ms09-049.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:10:26 |
|
2024-11-28 12:18:38 |
|
2023-12-07 21:28:05 |
|
2021-05-04 12:09:21 |
|
2021-04-22 01:09:41 |
|
2020-05-23 00:23:34 |
|
2018-10-31 00:19:55 |
|
2018-10-13 00:22:48 |
|
2017-09-29 09:24:09 |
|
2016-09-30 01:02:02 |
|
2016-08-31 12:01:45 |
|
2016-04-26 18:43:57 |
|
2014-02-17 10:49:29 |
|
2013-11-11 12:38:16 |
|
2013-05-10 23:47:49 |
|