Executive Summary
Summary | |
---|---|
Title | Vulnerability in Windows Media Encoder 9 Could Allow Remote Code Execution (954156) |
Informations | |||
---|---|---|---|
Name | MS08-053 | First vendor Publication | 2008-09-09 |
Vendor | Microsoft | Last vendor Modification | 2008-09-15 |
Severity (Vendor) | Critical | Revision | 2.0 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Revision Note: V2.0 (September 15, 2008): Added entry to the Frequently Asked Questions (FAQ) Related to This Security Update section to communicate the re-release of the Norwegian language update for Windows Media Encoder 9 Series running on Microsoft Windows 2000 Service Pack 4, Windows Media Encoder 9 Series running on Windows XP Service Pack 2 and Windows XP Service Pack 3, and Windows Media Encoder 9 Series running on Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2. Customers who require the Norwegian language updates need to download and install the re-released updates.Summary: This security update resolves a privately reported vulnerability in Windows Media Encoder 9 Series. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. |
Original Source
Url : http://www.microsoft.com/technet/security/bulletin/MS08-053.mspx |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:6018 | |||
Oval ID: | oval:org.mitre.oval:def:6018 | ||
Title: | Windows Media Encoder Buffer Overrun Vulnerability | ||
Description: | Stack-based buffer overflow in the WMEncProfileManager ActiveX control in wmex.dll in Microsoft Windows Media Encoder 9 Series allows remote attackers to execute arbitrary code via a long first argument to the GetDetailsString method, aka "Windows Media Encoder Buffer Overrun Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2008-3008 | Version: | 8 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 | Product(s): | Microsoft Media Encoder |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 | |
Os | 1 | |
Os | 4 | |
Os | 2 | |
Os | 1 |
SAINT Exploits
Description | Link |
---|---|
Windows Media Encoder 9 wmex.dll ActiveX buffer overflow | More info here |
ExploitDB Exploits
id | Description |
---|---|
2010-05-09 | Windows Media Encoder 9 wmex.dll ActiveX Buffer Overflow |
2008-09-13 | Windows Media Encoder XP SP2 - wmex.dll ActiveX BOF Exploit (MS08-053) |
OpenVAS Exploits
Date | Description |
---|---|
2008-09-10 | Name : Windows Media Encoder 9 Remote Code Execution Vulnerability (954156) File : nvt/secpod_ms08-053_900044.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
47962 | Microsoft Windows Media Encoder wmex.dll ActiveX Overflow A buffer overflow exists in Windows. The wmex.dll ActiveX control fails to validate data passed to the GetDetailsString method resulting in a stack overflow. With a specially crafted web site, a context-dependent attacker can cause arbitrary code execution resulting in a loss of integrity. |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2008-09-11 | IAVM : 2008-B-0057 - Microsoft Windows Media Encoder Remote Code Execution Vulnerability Severity : Category II - VMSKEY : V0017344 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Windows Media Encoder 9 ActiveX function call access RuleID : 27800 - Revision : 2 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Windows Media Encoder 9 ActiveX buffer overflow attempt RuleID : 16578 - Revision : 7 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Internet Explorer XSS mouseevent PII disclosure attempt RuleID : 14656 - Revision : 13 - Type : BROWSER-IE |
2014-01-10 | Windows Media Encoder 9 ActiveX function call unicode access RuleID : 14258 - Revision : 7 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Windows Media Encoder 9 ActiveX function call access RuleID : 14257 - Revision : 10 - Type : BROWSER-PLUGINS |
2014-01-10 | Windows Media Encoder 9 ActiveX clsid unicode access RuleID : 14256 - Revision : 7 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Windows Media Encoder 9 ActiveX clsid access RuleID : 14255 - Revision : 14 - Type : BROWSER-PLUGINS |
Metasploit Database
id | Description |
---|---|
2008-09-09 | Windows Media Encoder 9 wmex.dll ActiveX Buffer Overflow |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2008-09-10 | Name : Arbitrary code can be executed on the remote host through Media Player. File : smb_nt_ms08-053.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2020-05-23 13:17:12 |
|
2014-02-17 11:46:03 |
|
2014-01-19 21:30:14 |
|
2013-11-11 12:41:09 |
|
2013-05-11 00:49:22 |
|