CERTA-2008-AVI-590

Vulnerability from certfr_avis - Published: - Updated:

Plusieurs vulnérabilités dans les composants Windows Media permettent à une personne malintentionnée d'exécuter du code arbitraire à distance.

Description

Deux vulnérabilités ont été corrigées dans les composants Windows Media :

  • la première vulnérabilité concerne l'implémentation du Service Principal Name dans les composants Windows Media permettant la réflexion des informations d'identification NTLM et donc l'exécution de code arbitraire à distance (CVE-2008-3009) ;
  • la deuxième vulnérabilité concerne l'implémentation du protocole ISATAP (Intra-Site Automatic Tunnel Addressing Protocol) par des composants Windows Media (CVE-2008-3010). Une personne malintentionnée pourrait récupérer les informations d'identification NTLM d'un utilisateur en l'incitant à visiter une page spécialement conçue et à exécuter certaines actions.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Microsoft Windows module d'exécution du format Windows Media 9.0 ;
Microsoft Windows module d'exécution du format Windows Media 9.5 ;
Microsoft Windows module d'exécution du format Windows Media 7.1 ;
Microsoft Windows Windows Media Services Série 9 ;
Microsoft Windows Windows Media Services 4.1 ;
Microsoft Windows Windows Media Services 2008.
Microsoft Windows Lecteur Windows Media 6.4 ;
Microsoft Windows module d'exécution du format Windows Media 11 ;
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "module d\u0027ex\u00e9cution du format Windows Media 9.0 ;",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "module d\u0027ex\u00e9cution du format Windows Media 9.5 ;",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "module d\u0027ex\u00e9cution du format Windows Media 7.1 ;",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Media Services S\u00e9rie 9 ;",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Media Services 4.1 ;",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Media Services 2008.",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Lecteur Windows Media 6.4 ;",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "module d\u0027ex\u00e9cution du format Windows Media 11 ;",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nDeux vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les composants Windows Media\n:\n\n-   la premi\u00e8re vuln\u00e9rabilit\u00e9 concerne l\u0027impl\u00e9mentation du Service\n    Principal Name dans les composants Windows Media permettant la\n    r\u00e9flexion des informations d\u0027identification NTLM et donc l\u0027ex\u00e9cution\n    de code arbitraire \u00e0 distance (CVE-2008-3009) ;\n-   la deuxi\u00e8me vuln\u00e9rabilit\u00e9 concerne l\u0027impl\u00e9mentation du protocole\n    ISATAP (Intra-Site Automatic Tunnel Addressing Protocol) par des\n    composants Windows Media (CVE-2008-3010). Une personne\n    malintentionn\u00e9e pourrait r\u00e9cup\u00e9rer les informations d\u0027identification\n    NTLM d\u0027un utilisateur en l\u0027incitant \u00e0 visiter une page sp\u00e9cialement\n    con\u00e7ue et \u00e0 ex\u00e9cuter certaines actions.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2008-3009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-3009"
    },
    {
      "name": "CVE-2008-3010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-3010"
    }
  ],
  "links": [],
  "reference": "CERTA-2008-AVI-590",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2008-12-09T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "Plusieurs vuln\u00e9rabilit\u00e9s dans les composants \u003cspan\nclass=\"textit\"\u003eWindows Media\u003c/span\u003e permettent \u00e0 une personne\nmalintentionn\u00e9e d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance.\n",
  "title": "Vuln\u00e9rabilit\u00e9s dans les composants Windows Media",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft MS08-076 du 09 d\u00e9cembre 2008",
      "url": "http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…