Lucene search

K
openvasCopyright (C) 2009 Greenbone AGOPENVAS:1361412562310800829
HistoryJul 09, 2009 - 12:00 a.m.

Microsoft Video ActiveX Control 'msvidctl.dll' BOF Vulnerability

2009-07-0900:00:00
Copyright (C) 2009 Greenbone AG
plugins.openvas.org
19

6.7 Medium

AI Score

Confidence

Low

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.97 High

EPSS

Percentile

99.7%

Microsoft Video ActiveX Control is prone to a buffer overflow vulnerability.

# SPDX-FileCopyrightText: 2009 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.800829");
  script_version("2023-07-27T05:05:08+0000");
  script_tag(name:"last_modification", value:"2023-07-27 05:05:08 +0000 (Thu, 27 Jul 2023)");
  script_tag(name:"creation_date", value:"2009-07-09 10:58:23 +0200 (Thu, 09 Jul 2009)");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_cve_id("CVE-2008-0015", "CVE-2008-0020");
  script_name("Microsoft Video ActiveX Control 'msvidctl.dll' BOF Vulnerability");

  script_xref(name:"URL", value:"http://www.iss.net/threats/329.html");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/35558");
  script_xref(name:"URL", value:"http://support.microsoft.com/kb/972890");
  script_xref(name:"URL", value:"http://isc.sans.org/diary.html?storyid=6733");
  script_xref(name:"URL", value:"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-032");
  script_xref(name:"URL", value:"http://www.microsoft.com/technet/security/advisory/972890");

  script_category(ACT_GATHER_INFO);
  script_tag(name:"qod_type", value:"executable_version");
  script_copyright("Copyright (C) 2009 Greenbone AG");
  script_family("Buffer overflow");
  script_dependencies("secpod_reg_enum.nasl");
  script_mandatory_keys("SMB/registry_enumerated");
  script_require_ports(139, 445);

  script_tag(name:"impact", value:"Successful exploitation could allow execution of arbitrary code that affects
  the TV Tuner library, and can cause memory corruption.");

  script_tag(name:"affected", value:"Microsoft Video ActiveX Control on Microsoft Windows 2000/XP/2003.");

  script_tag(name:"insight", value:"- Stack-based buffer overflow error in MPEG2TuneRequest in msvidctl.dll in
    Microsoft DirectShow can be exploited via a crafted web page.

  - Unspecified error in msvidctl.dll is caused via unknown vectors that trigger
    memory corruption.");

  script_tag(name:"summary", value:"Microsoft Video ActiveX Control is prone to a buffer overflow vulnerability.");

  script_tag(name:"solution_type", value:"VendorFix");

  script_tag(name:"solution", value:"The vendor has released updates. Please see the references for more information.

  Workaround: Set the killbit for the CLSID {0955AC62-BF2E-4CBA-A2B9-A63F772D46CF}");

  exit(0);
}

include("smb_nt.inc");
include("secpod_reg.inc");
include("secpod_activex.inc");
include("secpod_smb_func.inc");

if(!get_kb_item("SMB/WindowsVersion")){
  exit(0);
}

if(hotfix_check_sp(win2k:5, xp:4, win2003:3, winVista:3, win2008:3) <= 0){
  exit(0);
}

# MS09-032 Hotfix (973346)
if(hotfix_missing(name:"973346") == 0){
  exit(0);
}

sysPath = smb_get_system32root();
if(sysPath)
{
  vers = fetch_file_version(sysPath:sysPath, file_name:"msvidctl.dll");
  if(!vers){
    exit(0);
  }
}

if(egrep(pattern:"^6\..*", string:vers))
{
  if(is_killbit_set(clsid:"{0955AC62-BF2E-4CBA-A2B9-A63F772D46CF}") == 0){
    security_message( port: 0, data: "The target host was found to be vulnerable" );
  }
}

sysPath = smb_get_system32root();
if(!sysPath){
  exit(0);
}
dllVer = fetch_file_version(sysPath:sysPath, file_name:"msvidctl.dll");
if(!dllVer){
  exit(0);
}

if(egrep(pattern:"^6\..*", string:dllVer))
{
  if(is_killbit_set(clsid:"{0955AC62-BF2E-4CBA-A2B9-A63F772D46CF}") == 0){
    security_message( port: 0, data: "The target host was found to be vulnerable" );
  }
}

6.7 Medium

AI Score

Confidence

Low

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.97 High

EPSS

Percentile

99.7%