7.8 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
6.7 Medium
AI Score
Confidence
Low
0.005 Low
EPSS
Percentile
75.8%
Microsoft Windows is prone to DNS Memory Corruption Vulnerability.
# SPDX-FileCopyrightText: 2009 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.900465");
script_version("2024-02-19T05:05:57+0000");
script_tag(name:"last_modification", value:"2024-02-19 05:05:57 +0000 (Mon, 19 Feb 2024)");
script_tag(name:"creation_date", value:"2009-03-05 06:25:55 +0100 (Thu, 05 Mar 2009)");
script_tag(name:"cvss_base", value:"7.8");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:C");
script_cve_id("CVE-2008-6194");
script_name("Microsoft Windows DNS Memory Corruption Vulnerability (Mar 2009)");
script_xref(name:"URL", value:"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-062");
script_xref(name:"URL", value:"http://www.securityfocus.com/archive/1/archive/1/491831/100/0/threaded");
script_xref(name:"URL", value:"http://www.securityfocus.com/archive/1/archive/1/491815/100/0/threaded");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2009 Greenbone AG");
script_family("Windows");
script_dependencies("smb_reg_service_pack.nasl");
script_mandatory_keys("SMB/WindowsVersion");
script_require_ports(139, 445);
script_tag(name:"affected", value:"Microsoft Windows Server 2000 and 2003.");
script_tag(name:"insight", value:"This flaw is due to memory leak vulnerability in Microsoft Windows DNS
Server through DNS packets.");
script_tag(name:"solution", value:"The vendor has released updates. Please see the references for more information.");
script_tag(name:"summary", value:"Microsoft Windows is prone to DNS Memory Corruption Vulnerability.");
script_tag(name:"impact", value:"Successful exploitation will let the attacker execute arbitrary codes in
the context of the application and can cause memory corruption in the DNS
service.");
script_tag(name:"qod_type", value:"registry");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("smb_nt.inc");
include("secpod_reg.inc");
include("version_func.inc");
include("secpod_smb_func.inc");
if(!get_kb_item("SMB/WindowsVersion")){
exit(0);
}
if(hotfix_check_sp(win2k:5, win2003:3) <= 0){
exit(0);
}
sys32Path = registry_get_sz(key:"SOFTWARE\Microsoft\COM3\Setup",
item:"Install Path");
if(!sys32Path){
exit(0);
}
share = ereg_replace(pattern:"([A-Z]):.*", replace:"\1$", string:sys32Path);
file = ereg_replace(pattern:"[A-Z]:(.*)", replace:"\1", string:sys32Path + "\dns.exe");
dnsVer = GetVer(file:file, share:share);
if(dnsVer != NULL)
{
if(get_kb_item("SMB/Win2K/ServicePack")) # Win-2000 SP4 and prior
{
if(version_is_less_equal(version:dnsVer, test_version:"5.0.2195.7147")){
report = report_fixed_ver(installed_version:dnsVer, vulnerable_range:"Less than or equal to 5.0.2195.7147");
security_message(port: 0, data: report);
}
exit(0);
}
SP = get_kb_item("SMB/Win2003/ServicePack");
if("Service Pack 1" >< SP) # Win-2003 SP1
{
if(version_is_less_equal(version:dnsVer, test_version:"5.2.3790.3027")){
report = report_fixed_ver(installed_version:dnsVer, vulnerable_range:"Less than or equal to 5.2.3790.3027");
security_message(port: 0, data: report);
}
exit(0);
}
else if("Service Pack 2" >< SP) # Win-2003 SP2
{
if(version_is_less_equal(version:dnsVer, test_version:"5.2.3790.4171")){
report = report_fixed_ver(installed_version:dnsVer, vulnerable_range:"Less than or equal to 5.2.3790.4171");
security_message(port: 0, data: report);
}
exit(0);
}
security_message( port: 0, data: "The target host was found to be vulnerable" );
}