27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2009-1870<br />

MS09-047: Vulnerabilities in Windows Media Format (Windows 2000)<br />

<strong>PVS</strong> ID: 5163 FAMILY: Generic RISK: HIGH NESSUS ID:40890<br />

Description: Synopsis : \n\nThe remote Windows host is affected by multiple attack vectors.\n\nThe<br />

remote Windows host contains a version of the Windows Media Format Runtime that is<br />

affected by multiple issues : \n\n - The ASF parser has an invalid free vulnerability. A<br />

remote attacker could exploit this by tricking a user into opening a specially crafted ASF<br />

file, which could lead to arbitrary code execution. (CVE-2009-2498)\n\n - The MP3 parser<br />

has a memory corruption vulnerability. A remote attacker could exploit this by tricking a<br />

user into opening a specially crafted MP3 file, which could lead to arbitrary code<br />

execution. (CVE-2009-2499)\n\nNote, that this patch is not available for unsupported<br />

Service Packs. For your information, the installed version of Windows Media Format<br />

Runtime is: \n %L \nIAVA Reference : 2009-A-0076\nSTIG Finding Severity : Category II<br />

Solution: Apply the patches in the Microsoft bulletin.<br />

CVE-2009-2499<br />

MS09-047: Vulnerabilities in Windows Media Format (Windows Server 2003)<br />

<strong>PVS</strong> ID: 5164 FAMILY: Generic RISK: HIGH NESSUS ID:40890<br />

Description: Synopsis : \n\nThe remote Windows host is affected by multiple attack vectors.\n\nThe<br />

remote Windows host contains a version of the Windows Media Format Runtime that is<br />

affected by multiple issues : \n\n - The ASF parser has an invalid free vulnerability. A<br />

remote attacker could exploit this by tricking a user into opening a specially crafted ASF<br />

file, which could lead to arbitrary code execution. (CVE-2009-2498)\n\n - The MP3 parser<br />

has a memory corruption vulnerability. A remote attacker could exploit this by tricking a<br />

user into opening a specially crafted MP3 file, which could lead to arbitrary code<br />

execution. (CVE-2009-2499)\n\nNote that this patch is not available for unsupported<br />

Service Packs. For your information, the installed version of Windows Media Format<br />

Runtime is: \n %L \nIAVA Reference : 2009-A-0076\nSTIG Finding Severity : Category II<br />

Solution: Apply the patches in the Microsoft bulletin.<br />

CVE-2009-2499<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

MS09-047: Vulnerabilities in Windows Media Format (Windows XP 32-bit)<br />

<strong>PVS</strong> ID: 5165 FAMILY: Generic RISK: HIGH NESSUS ID:40890<br />

Description: Synopsis : \n\nThe remote Windows host is affected by multiple attack vectors.\n\nThe<br />

remote Windows host contains a version of the Windows Media Format Runtime that is<br />

affected by multiple issues : \n\n - The ASF parser has an invalid free vulnerability. A<br />

remote attacker could exploit this by tricking a user into opening a specially crafted ASF<br />

file, which could lead to arbitrary code execution. (CVE-2009-2498)\n\n - The MP3 parser<br />

has a memory corruption vulnerability. A remote attacker could exploit this by tricking a<br />

Family Internet Services 1373

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!