Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2009-2498 | First vendor Publication | 2009-09-08 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Microsoft Windows Media Format Runtime 9.0, 9.5, and 11 and Windows Media Services 9.1 and 2008 do not properly parse malformed headers in Advanced Systems Format (ASF) files, which allows remote attackers to execute arbitrary code via a crafted (1) .asf, (2) .wmv, or (3) .wma file, aka "Windows Media Header Parsing Invalid Free Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2498 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:6257 | |||
Oval ID: | oval:org.mitre.oval:def:6257 | ||
Title: | Windows Media Header Parsing Invalid Free Vulnerability | ||
Description: | Microsoft Windows Media Format Runtime 9.0, 9.5, and 11 and Windows Media Services 9.1 and 2008 do not properly parse malformed headers in Advanced Systems Format (ASF) files, which allows remote attackers to execute arbitrary code via a crafted (1) .asf, (2) .wmv, or (3) .wma file, aka "Windows Media Header Parsing Invalid Free Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2009-2498 | Version: | 11 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 | Product(s): | Windows Media Format Runtime 9.0 Windows Media Format Runtime 9.5 Windows Media Format Runtime 11 Microsoft Media Services 9.1 Microsoft Media Services 9 |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-09-10 | Name : Microsoft Windows Media Format Remote Code Execution Vulnerability (973812) File : nvt/secpod_ms09-047.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
57802 | Microsoft Windows Media ASF Header Parsing Invalid Free Arbitrary Code Execution |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2009-09-10 | IAVM : 2009-A-0076 - Multiple Vulnerabilities in Microsoft Windows Media Format Severity : Category II - VMSKEY : V0019916 |
2009-09-10 | IAVM : 2009-A-0077 - Multiple Microsoft TCP/IP Remote Code Execution Vulnerabilities Severity : Category I - VMSKEY : V0019917 |
Snort® IPS/IDS
Date | Description |
---|---|
2019-09-05 | Microsoft Windows mp3 file malformed ID3 APIC header code execution attempt RuleID : 50893 - Revision : 1 - Type : FILE-MULTIMEDIA |
2019-09-05 | Microsoft Windows mp3 file malformed ID3 APIC header code execution attempt RuleID : 50892 - Revision : 1 - Type : FILE-MULTIMEDIA |
2014-01-10 | Microsoft Windows Media encryption sample ID header RCE attempt RuleID : 23576 - Revision : 5 - Type : FILE-MULTIMEDIA |
2014-01-10 | Microsoft Windows Media encryption sample ID header RCE attempt RuleID : 23575 - Revision : 5 - Type : FILE-MULTIMEDIA |
2014-01-10 | Microsoft Windows Media pixel aspect ratio header RCE attempt RuleID : 23574 - Revision : 5 - Type : FILE-MULTIMEDIA |
2014-01-10 | Microsoft Windows Media content type header RCE attempt RuleID : 23573 - Revision : 5 - Type : FILE-MULTIMEDIA |
2014-01-10 | Microsoft Windows Media file name header RCE attempt RuleID : 23572 - Revision : 5 - Type : FILE-MULTIMEDIA |
2014-01-10 | Microsoft Windows Media Timecode header RCE attempt RuleID : 23571 - Revision : 5 - Type : FILE-MULTIMEDIA |
2014-01-10 | Microsoft Windows Media sample duration header RCE attempt RuleID : 23570 - Revision : 5 - Type : FILE-MULTIMEDIA |
2014-01-10 | Microsoft Windows Media encryption sample ID header RCE attempt RuleID : 19450 - Revision : 13 - Type : FILE-MULTIMEDIA |
2014-01-10 | Microsoft Windows Media encryption sample ID header RCE attempt RuleID : 19449 - Revision : 13 - Type : FILE-MULTIMEDIA |
2014-01-10 | Microsoft Windows Media pixel aspect ratio header RCE attempt RuleID : 19448 - Revision : 13 - Type : FILE-MULTIMEDIA |
2014-01-10 | Microsoft Windows Media content type header RCE attempt RuleID : 19447 - Revision : 13 - Type : FILE-MULTIMEDIA |
2014-01-10 | Microsoft Windows Media file name header RCE attempt RuleID : 19446 - Revision : 13 - Type : FILE-MULTIMEDIA |
2014-01-10 | Microsoft Windows Media Timecode header RCE attempt RuleID : 19445 - Revision : 13 - Type : FILE-MULTIMEDIA |
2014-01-10 | Microsoft Windows Media sample duration header RCE attempt RuleID : 19444 - Revision : 12 - Type : FILE-MULTIMEDIA |
2014-01-10 | Microsoft Windows Media extended stream properties object RCE attempt RuleID : 16338 - Revision : 5 - Type : WEB-CLIENT |
2014-01-10 | Microsoft mp3 malformed APIC header RCE attempt RuleID : 15920 - Revision : 10 - Type : FILE-MULTIMEDIA |
2014-01-10 | Microsoft Windows Media encryption sample ID header RCE attempt RuleID : 15919 - Revision : 6 - Type : WEB-CLIENT |
2014-01-10 | Microsoft Windows Media pixel aspect ratio header RCE attempt RuleID : 15918 - Revision : 6 - Type : WEB-CLIENT |
2014-01-10 | Microsoft Windows Media content type header RCE attempt RuleID : 15917 - Revision : 6 - Type : WEB-CLIENT |
2014-01-10 | Microsoft Windows Media file name header RCE attempt RuleID : 15916 - Revision : 6 - Type : WEB-CLIENT |
2014-01-10 | Microsoft Windows Media Timecode header RCE attempt RuleID : 15915 - Revision : 6 - Type : WEB-CLIENT |
2014-01-10 | Microsoft Windows Media sample duration header RCE attempt RuleID : 15914 - Revision : 6 - Type : WEB-CLIENT |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-09-08 | Name : Arbitrary code can be executed on the remote host through opening a Windows M... File : smb_nt_ms09-047.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:10:26 |
|
2024-11-28 12:19:26 |
|
2023-12-07 21:28:05 |
|
2020-05-23 00:24:03 |
|
2019-02-26 17:19:32 |
|
2018-10-31 00:19:57 |
|
2018-10-13 00:22:50 |
|
2017-09-19 09:23:18 |
|
2016-09-30 01:02:07 |
|
2016-08-31 12:01:50 |
|
2016-04-26 18:58:46 |
|
2014-02-17 10:50:49 |
|
2014-01-19 21:26:01 |
|
2013-11-11 12:38:21 |
|
2013-05-10 23:54:11 |
|