Follow:

Policy:Win/WinHTTP.ServicesAPI.RCE!CVE-2009-0086

Severity rating
Critical

Class/Type
Policy

Discovered date
2009-04-14T12:41:36

Attack vector
Remote

Authentication required
No

Public exploits available
Yes

Signature detection
Medium



On this page




Description

A remote code execution vulnerability exists in the way that Windows HTTP Services handle specific values that are returned by a remote Web server. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with the same user rights as the service or application which calls the WinHTTP API to connect to the attacker's Web server.



Impact

An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with the same user rights as the service or application which calls the WinHTTP API to connect to the attacker's Web server.



Technical details (analysis)

Windows HTTP Services (WinHTTP) provides developers with an HTTP client application programming interface (API) to send requests through the HTTP protocol to Web servers. WinHTTP can be used by both Microsoft Windows components and third-party software. WinHTTP is, amongst others, used by the Universal Plug and Play (UPNP) Service. The vulnerability is caused by lack of validation of a parameter returned by a remote Web server. This could lead to arbitrary code execution.



Affected software

Microsoft Windows 2000 Service Pack 4
Windows XP Service Pack 2 and Windows XP Service Pack 3
Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista and Windows Vista Service Pack 1
Windows Vista x64 Edition and Windows Vista x64 Edition Service Pack 1
Windows Server 2008 for 32-bit Systems
Windows Server 2008 for x64-based Systems
Windows Server 2008 for Itanium-based Systems



Non-affected software

All applications not on the affected list



References




Solutions




NIS signature

Name: Policy:Win/WinHTTP.ServicesAPI.RCE!CVE-2009-0086
Release Date: 2009-04-14T12:41:36



Known false positives

This is a policy based signature that might cause false positives for applications not using WinHTTP.



Work-arounds

No work-around have been identified at this time.