Executive Summary

Summary
Title Vulnerabilities in Windows Search Could Allow Remote Code Execution (959349)
Informations
Name MS08-075 First vendor Publication 2008-12-09
Vendor Microsoft Last vendor Modification 2008-12-10
Severity (Vendor) Critical Revision 1.1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:S/C:C/I:C/A:C)
Cvss Base Score 8.5 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 6.8 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

Revision Note: V1.1 (December 10, 2008): Corrected registry key in Workarounds for Windows Search Parsing Vulnerability

Original Source

Url : http://www.microsoft.com/technet/security/bulletin/MS08-075.mspx

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-399 Resource Management Errors

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:5853
 
Oval ID: oval:org.mitre.oval:def:5853
Title: Windows Saved Search Vulnerability
Description: The Windows Search component in Microsoft Windows Vista Gold and SP1 and Server 2008 does not properly free memory during a save operation for a Windows Search file, which allows remote attackers to execute arbitrary code via a crafted saved-search file, aka "Windows Saved Search Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2008-4268
Version: 3
Platform(s): Microsoft Windows Vista
Microsoft Windows Server 2008
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:6110
 
Oval ID: oval:org.mitre.oval:def:6110
Title: Windows Search Parsing Vulnerability
Description: The search-ms protocol handler in Windows Explorer in Microsoft Windows Vista Gold and SP1 and Server 2008 uses untrusted parameter data obtained from incorrect parsing, which allows remote attackers to execute arbitrary code via a crafted HTML document, aka "Windows Search Parsing Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2008-4269
Version: 3
Platform(s): Microsoft Windows Vista
Microsoft Windows Server 2008
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 4
Os 3

SAINT Exploits

Description Link
Windows search-ms protocol handler command execution vulnerability More info here

OpenVAS Exploits

Date Description
2010-12-21 Name : Microsoft Windows IPsec Policy Processing Information Disclosure Vulnerabilit...
File : nvt/gb_ms08-047.nasl
2010-12-14 Name : Microsoft Windows Search Remote Code Execution Vulnerability (959349)
File : nvt/gb_ms08-075.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
50566 Microsoft Windows Explorer search-ms Protocol Handler Arbitrary Code Execution

50565 Microsoft Windows Explorer Saved Search File Handling Arbitrary Code Execution

Information Assurance Vulnerability Management (IAVM)

Date Description
2008-12-11 IAVM : 2008-B-0083 - Multiple Windows Search Remote Code Execution Vulnerabilities
Severity : Category II - VMSKEY : V0017913

Snort® IPS/IDS

Date Description
2015-01-06 Microsoft Windows search protocol remote command injection attempt
RuleID : 32615 - Revision : 2 - Type : OS-WINDOWS
2014-01-10 Microsoft search file attachment detected
RuleID : 21880 - Revision : 12 - Type : FILE-IDENTIFY
2014-01-10 Microsoft search file attachment detected
RuleID : 21879 - Revision : 11 - Type : FILE-IDENTIFY
2014-01-10 Microsoft Windows search protocol remote command injection attempt
RuleID : 15116 - Revision : 16 - Type : OS-WINDOWS
2014-01-10 Microsoft search file download request
RuleID : 13911 - Revision : 22 - Type : FILE-IDENTIFY

Nessus® Vulnerability Scanner

Date Description
2008-12-10 Name : Vulnerabilities in the Windows Shell may allow an attacker to execute privile...
File : smb_nt_ms08-075.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
Date Informations
2015-01-06 21:48:45
  • Multiple Updates
2014-02-17 11:46:08
  • Multiple Updates
2014-01-19 21:30:16
  • Multiple Updates
2013-11-11 12:41:10
  • Multiple Updates
2013-05-11 00:49:25
  • Multiple Updates