Remote code execution in Microsoft Windows



Published: 2009-04-14 | Updated: 2016-12-16
Risk Critical
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2009-0084
CWE-ID CWE-416
Exploitation vector Network
Public exploit This vulnerability is being exploited in the wild.
Vulnerable software
Subscribe
Windows Server
Operating systems & Components / Operating system

Windows
Operating systems & Components / Operating system

Vendor Microsoft

Security Bulletin

This security bulletin contains one critical risk vulnerability.

1) Use-after-free error

EUVDB-ID: #VU1356

Risk: Critical

CVSSv3.1: 8.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C]

CVE-ID: CVE-2009-0084

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to use-after-free error when processing a malformed JPEG file. A remote attacker can create a specially crafted JPEG file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.

Note: this vulnerability is being actively exploited.

Mitigation

Install update from vendor's website:

Microsoft Windows 2000 Service Pack 4 with DirectX 8.1:
https://www.microsoft.com/downloads/details.aspx?FamilyId=0ec5b7c7-13d3-467a-b24e-3cc6fb47adf6
http://go.microsoft.com/fwlink/?LinkID=118655
Microsoft Windows 2000 Service Pack 4 with DirectX 9.0:
https://www.microsoft.com/downloads/details.aspx?FamilyId=8b98ed5c-a3ab-45a7-a61e-349eae304bc6
http://go.microsoft.com/fwlink/?LinkID=118655
Windows XP Service Pack 2 and Windows XP Service Pack 3 with DirectX 9.0:
https://www.microsoft.com/downloads/details.aspx?FamilyId=feb5d821-f210-40e8-b1aa-2ca3170df8df
http://go.microsoft.com/fwlink/?LinkID=118655
Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2 with DirectX 9.0:
https://www.microsoft.com/downloads/details.aspx?FamilyId=f1be8b7c-4874-4342-99b3-76ff725fbb9a
http://go.microsoft.com/fwlink/?LinkID=118655
Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2 with DirectX 9.0:
https://www.microsoft.com/downloads/details.aspx?FamilyId=c1b4cd76-1dd6-43fa-bb9a-20c428985bfd
http://go.microsoft.com/fwlink/?LinkID=118655
Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2 with DirectX 9.0:
https://www.microsoft.com/downloads/details.aspx?FamilyId=f0e1e1db-94a5-451c-ab11-6b431fa065f1
http://go.microsoft.com/fwlink/?LinkID=118655
Windows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium-based Systems with DirectX 9.0:
https://www.microsoft.com/downloads/details.aspx?FamilyId=8f36c215-fa8a-40c2-b680-6b1fece03b8d
http://go.microsoft.com/fwlink/?LinkID=118655

Vulnerable software versions

Windows Server: 2003

Windows: 2000 - XP

External links

http://technet.microsoft.com/en-us/library/security/ms09-011.aspx


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.



###SIDEBAR###