Microsoft Windows HTTP.sys Remote Code Execution Vulnerability (3042553)

2015-04-15T00:00:00
ID OPENVAS:1361412562310805370
Type openvas
Reporter Copyright (C) 2015 Greenbone Networks GmbH
Modified 2017-06-28T00:00:00

Description

This host is missing an important security update according to Microsoft Bulletin MS15-034.

                                        
                                            ###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_ms15-034.nasl 2015-04-15 12:09:33 +0530 Apr$
#
# Microsoft Windows HTTP.sys Remote Code Execution Vulnerability (3042553)
#
# Authors:
# Deependra Bapna <bdeependra@secpod.com>
#
# Copyright:
# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.805370");
  script_version("$Revision: 6453 $");
  script_cve_id("CVE-2015-1635");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_tag(name:"last_modification", value:"$Date: 2017-06-28 11:59:05 +0200 (Wed, 28 Jun 2017) $");
  script_tag(name:"creation_date", value:"2015-04-15 12:09:33 +0530 (Wed, 15 Apr 2015)");
  script_name("Microsoft Windows HTTP.sys Remote Code Execution Vulnerability (3042553)");

  script_tag(name:"summary", value:"This host is missing an important security
  update according to Microsoft Bulletin MS15-034.");

  script_tag(name:"vuldetect", value:"Get the vulnerable file version and
  check appropriate patch is applied or not.");

  script_tag(name:"insight", value:"Flaw exists due to the HTTP protocol stack
  'HTTP.sys' that is triggered when parsing HTTP requests.");

  script_tag(name:"impact", value:"Successful exploitation will allow remote
  attackers to run arbitrary code in the context of the current user and
  to perform actions in the security context of the current user.

  Impact Level: System");

  script_tag(name:"affected", value:"
  Microsoft Windows 8 x32/x64
  Microsoft Windows 8.1 x32/x64
  Microsoft Windows Server 2012
  Microsoft Windows Server 2012 R2
  Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior
  Microsoft Windows 7 x32/x64 Service Pack 1 and prior");

  script_tag(name:"solution", value:"Run Windows Update and update the
  listed hotfixes or download and update mentioned hotfixes in the advisory
  from the below link,
  https://technet.microsoft.com/library/security/MS15-034");

  script_tag(name:"solution_type", value:"VendorFix");

  script_tag(name:"qod_type", value:"executable_version");

  script_xref(name : "URL" , value : "https://support.microsoft.com/kb/3042553");
  script_xref(name : "URL" , value : "https://technet.microsoft.com/library/security/MS15-034");

  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2015 Greenbone Networks GmbH");
  script_family("Windows : Microsoft Bulletins");
  script_dependencies("secpod_reg_enum.nasl");
  script_mandatory_keys("SMB/WindowsVersion");
  script_require_ports(139, 445);
  exit(0);
}


include("smb_nt.inc");
include("secpod_reg.inc");
include("version_func.inc");
include("secpod_smb_func.inc");

## Variables Initialization
sysPath = "";
HttpVer = "";
edition = "";

## Check for OS and Service Pack
if(hotfix_check_sp(win7:2, win7x64:2, win2008r2:2, win8:1, win8x64:1,
                   win2012:1, win2012R2:1, win8_1:1, win8_1x64:1) <= 0)
{
  exit(0);
}

## Get System Path
sysPath = smb_get_systemroot();
if(!sysPath){
  exit(0);
}

## Get Version from Http.sys file
HttpVer = fetch_file_version(sysPath, file_name:"\system32\drivers\Http.sys");
if(!HttpVer){
  exit(0);
}

## Windows 7 and Windows 2008 R2
if(hotfix_check_sp(win7:2, win7x64:2, win2008r2:2) > 0)
{
  ## Check for Http.sys version
  if(version_is_less(version:HttpVer, test_version:"6.1.7601.18772") ||
     version_in_range(version:HttpVer, test_version:"6.1.7601.22000", test_version2:"6.1.7601.22975")){
    security_message(0);
  }
  exit(0);
}

## Windows 8 and Windows Server 2012
if(hotfix_check_sp(win8:1, win8x64:1, win2012:1) > 0)
{
  ## Check for Http.sys version
  if(version_is_less(version:HttpVer, test_version:"6.2.9200.17285") ||
     version_in_range(version:HttpVer, test_version:"6.2.9200.20000", test_version2:"6.2.9200.21400")){
     security_message(0);
  }
  exit(0);
}

## Windows 8.1 and Windows Server 2012 R2
if(hotfix_check_sp(win8_1:1, win8_1x64:1, win2012R2:1) > 0)
{
  ## Check for Http.sys version
  if(version_is_less(version:HttpVer, test_version:"6.3.9600.17712")){
    security_message(0);
  }
  exit(0);
}