Vulnerabilities > CVE-2008-3008 - Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Microsoft products

047910
CVSS 9.3 - CRITICAL
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
microsoft
CWE-119
critical
nessus
exploit available
metasploit

Summary

Stack-based buffer overflow in the WMEncProfileManager ActiveX control in wmex.dll in Microsoft Windows Media Encoder 9 Series allows remote attackers to execute arbitrary code via a long first argument to the GetDetailsString method, aka "Windows Media Encoder Buffer Overrun Vulnerability."

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Buffer Overflow via Environment Variables
    This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
  • Overflow Buffers
    Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an attacker. As a consequence, an attacker is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the attackers' choice.
  • Client-side Injection-induced Buffer Overflow
    This type of attack exploits a buffer overflow vulnerability in targeted client software through injection of malicious content from a custom-built hostile service.
  • Filter Failure through Buffer Overflow
    In this attack, the idea is to cause an active filter to fail by causing an oversized transaction. An attacker may try to feed overly long input strings to the program in an attempt to overwhelm the filter (by causing a buffer overflow) and hoping that the filter does not fail securely (i.e. the user input is let into the system unfiltered).
  • MIME Conversion
    An attacker exploits a weakness in the MIME conversion routine to cause a buffer overflow and gain control over the mail server machine. The MIME system is designed to allow various different information formats to be interpreted and sent via e-mail. Attack points exist when data are converted to MIME compatible format and back.

Exploit-Db

  • descriptionWindows Media Encoder wmex.dll ActiveX BOF Exploit (MS08-053). CVE-2008-3008. Remote exploit for windows platform
    fileexploits/windows/remote/6454.html
    idEDB-ID:6454
    last seen2016-01-31
    modified2008-09-13
    platformwindows
    port
    published2008-09-13
    reporterhaluznik
    sourcehttps://www.exploit-db.com/download/6454/
    titleWindows Media Encoder XP SP2 - wmex.dll ActiveX BoF Exploit MS08-053
    typeremote
  • descriptionWindows Media Encoder 9 wmex.dll ActiveX Buffer Overflow. CVE-2008-3008. Remote exploit for windows platform
    idEDB-ID:16521
    last seen2016-02-02
    modified2010-05-09
    published2010-05-09
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/16521/
    titleWindows Media Encoder 9 wmex.dll ActiveX Buffer Overflow

Metasploit

descriptionThis module exploits a stack buffer overflow in Windows Media Encoder 9. When sending an overly long string to the GetDetailsString() method of wmex.dll an attacker may be able to execute arbitrary code.
idMSF:EXPLOIT/WINDOWS/BROWSER/MS08_053_MEDIAENCODER
last seen2020-05-26
modified2017-10-05
published2008-10-01
referenceshttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3008
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/browser/ms08_053_mediaencoder.rb
titleWindows Media Encoder 9 wmex.dll ActiveX Buffer Overflow

Nessus

NASL familyWindows : Microsoft Bulletins
NASL idSMB_NT_MS08-053.NASL
descriptionThe remote host is running Windows Media Player 9. There is a vulnerability in the remote version of this software that could allow an attacker to execute arbitrary code on the remote host. To exploit this flaw, the attacker would need to set up a rogue web page and entice a victim to visit it.
last seen2020-06-01
modified2020-06-02
plugin id34121
published2008-09-10
reporterThis script is Copyright (C) 2008-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/34121
titleMS08-053: Vulnerability in Windows Media Encoder 9 Could Allow Remote Code Execution (954156)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(34121);
 script_version("1.27");
 script_cvs_date("Date: 2018/11/15 20:50:30");

 script_cve_id("CVE-2008-3008");
 script_bugtraq_id(31065);
 script_xref(name:"CERT", value:"996227");
 script_xref(name:"MSFT", value:"MS08-053");
 script_xref(name:"MSKB", value:"954156");
 script_xref(name:"IAVB", value:"2008-B-0057");

 script_name(english:"MS08-053: Vulnerability in Windows Media Encoder 9 Could Allow Remote Code Execution (954156)");
 script_summary(english:"Checks the version of Media Player");

 script_set_attribute(attribute:"synopsis", value:
"Arbitrary code can be executed on the remote host through Media
Player.");
 script_set_attribute(attribute:"description", value:
"The remote host is running Windows Media Player 9.

There is a vulnerability in the remote version of this software that
could allow an attacker to execute arbitrary code on the remote host.

To exploit this flaw, the attacker would need to set up a rogue web
page and entice a victim to visit it.");
 script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2008/ms08-053");
 script_set_attribute(attribute:"solution", value:
"Microsoft has released a set of patches for Windows 2000, XP, 2003,
Vista and 2008.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"exploit_framework_core", value:"true");
 script_set_attribute(attribute:"metasploit_name", value:'Windows Media Encoder 9 wmex.dll ActiveX Buffer Overflow');
 script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
 script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
 script_set_attribute(attribute:"canvas_package", value:'CANVAS');
 script_cwe_id(119);

 script_set_attribute(attribute:"vuln_publication_date", value:"2008/09/09");
 script_set_attribute(attribute:"patch_publication_date", value:"2008/09/09");
 script_set_attribute(attribute:"plugin_publication_date", value:"2008/09/10");

 script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
 script_set_attribute(attribute:"stig_severity", value:"II");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);

 script_copyright(english:"This script is Copyright (C) 2008-2018 Tenable Network Security, Inc.");
 script_family(english:"Windows : Microsoft Bulletins");

 script_dependencies("smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
 script_require_keys("SMB/MS_Bulletin_Checks/Possible");
 script_require_ports(139, 445, 'Host/patch_management_checks');
 exit(0);
}

include("audit.inc");
include("smb_hotfixes_fcheck.inc");
include("smb_hotfixes.inc");
include("smb_func.inc");
include("misc_func.inc");

get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");

bulletin = 'MS08-053';
kb = '954156';

kbs = make_list(kb);
if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);

get_kb_item_or_exit("SMB/Registry/Enumerated");
get_kb_item_or_exit("SMB/WindowsVersion", exit_code:1);

if (hotfix_check_sp_range(win2k:'4,5', xp:'2,3', win2003:'1,2', vista:'0,1') <= 0) audit(AUDIT_OS_SP_NOT_VULN);


login	=  kb_smb_login();
pass  	=  kb_smb_password();
domain 	=  kb_smb_domain();
port    =  kb_smb_transport();

if(! smb_session_init()) audit(AUDIT_FN_FAIL, "smb_session_init");

r = NetUseAdd(login:login, password:pass, domain:domain, share:"IPC$");
if ( r != 1 ) audit(AUDIT_SHARE_FAIL, "IPC$");

hklm = RegConnectRegistry(hkey:HKEY_LOCAL_MACHINE);
if ( isnull(hklm) )
{
 NetUseDel();
 audit(AUDIT_REG_FAIL);
}


path = NULL;

key = "Software\Microsoft\Windows Media\Encoder";
item = "InstallDir";

key_h = RegOpenKey(handle:hklm, key:key, mode:MAXIMUM_ALLOWED);
if ( ! isnull(key_h) )
{
 value = RegQueryValue(handle:key_h, item:item);
 if (!isnull (value)) path = value[1];

 RegCloseKey (handle:key_h);
}
RegCloseKey (handle:hklm);
NetUseDel();


if (path)
{
  share = hotfix_path2share(path:path);
  if (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);

  if (
    hotfix_is_vulnerable(os:"6.0", arch:"x86", file:"Wmex.dll", version:"9.0.0.3359", min_version:"9.0.0.0", path:path, bulletin:bulletin, kb:kb) ||
    hotfix_is_vulnerable(os:"6.0", arch:"x64", file:"Wmex.dll", version:"10.0.0.3817", min_version:"10.0.0.0", path:path, bulletin:bulletin, kb:kb) ||
    hotfix_is_vulnerable(os:"5.2", arch:"x86", file:"Wmex.dll", version:"9.0.0.3359", min_version:"9.0.0.0", path:path, bulletin:bulletin, kb:kb) ||
    hotfix_is_vulnerable(os:"5.2", arch:"x64", file:"Wmex.dll", version:"10.0.0.3817", min_version:"10.0.0.0", path:path, bulletin:bulletin, kb:kb) ||
    hotfix_is_vulnerable(os:"5.1", arch:"x86", file:"Wmex.dll", version:"9.0.0.3359", min_version:"9.0.0.0", path:path, bulletin:bulletin, kb:kb) ||
    hotfix_is_vulnerable(os:"5.0", arch:"x86", file:"Wmex.dll", version:"9.0.0.3359", min_version:"9.0.0.0", path:path, bulletin:bulletin, kb:kb)
  )
  {
    set_kb_item(name:"SMB/Missing/"+bulletin, value:TRUE);
    hotfix_security_hole();
    hotfix_check_fversion_end();
    exit(0);
  }
  else
  {
    hotfix_check_fversion_end();
    audit(AUDIT_HOST_NOT, 'affected');
  }
}
else audit(AUDIT_HOST_NOT, 'affected');

Oval

accepted2014-08-18T04:06:07.263-04:00
classvulnerability
contributors
  • nameSudhir Gandhe
    organizationSecure Elements, Inc.
  • nameSudhir Gandhe
    organizationSecure Elements, Inc.
  • nameManeesh Jolly
    organizationPrism Microsystems, Inc.
  • nameManeesh Jolly
    organizationPrism Microsystems, Inc.
  • nameManeesh Jolly
    organizationPrism Microsystems, Inc.
  • nameJosh Turpin
    organizationSymantec Corporation
  • nameMaria Mikhno
    organizationALTX-SOFT
  • nameMaria Mikhno
    organizationALTX-SOFT
definition_extensions
  • commentMicrosoft Windows 2000 is installed
    ovaloval:org.mitre.oval:def:85
  • commentMicrosoft Windows XP (32-bit) is installed
    ovaloval:org.mitre.oval:def:1353
  • commentMicrosoft Windows Server 2003 (32-bit) is installed
    ovaloval:org.mitre.oval:def:1870
  • commentMicrosoft Windows Vista (32-bit) is installed
    ovaloval:org.mitre.oval:def:1282
  • commentMicrosoft Windows Server 2008 (32-bit) is installed
    ovaloval:org.mitre.oval:def:4870
  • commentMicrosoft Windows XP x64 is installed
    ovaloval:org.mitre.oval:def:15247
  • commentMicrosoft Windows Server 2003 (x64) is installed
    ovaloval:org.mitre.oval:def:730
  • commentMicrosoft Windows Vista x64 Edition is installed
    ovaloval:org.mitre.oval:def:2041
  • commentMicrosoft Windows Server 2008 (64-bit) is installed
    ovaloval:org.mitre.oval:def:5356
descriptionStack-based buffer overflow in the WMEncProfileManager ActiveX control in wmex.dll in Microsoft Windows Media Encoder 9 Series allows remote attackers to execute arbitrary code via a long first argument to the GetDetailsString method, aka "Windows Media Encoder Buffer Overrun Vulnerability."
familywindows
idoval:org.mitre.oval:def:6018
statusaccepted
submitted2008-09-09T13:58:00
titleWindows Media Encoder Buffer Overrun Vulnerability
version30

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/83176/ms08_053_mediaencoder.rb.txt
idPACKETSTORM:83176
last seen2016-12-05
published2009-11-26
reporterMC
sourcehttps://packetstormsecurity.com/files/83176/Windows-Media-Encoder-9-wmex.dll-ActiveX-Buffer-Overflow.html
titleWindows Media Encoder 9 wmex.dll ActiveX Buffer Overflow

Saint

bid31065
descriptionWindows Media Encoder 9 wmex.dll ActiveX buffer overflow
idwin_patch_wmex
osvdb47962
titlewindows_media_encoder_wmex
typeclient

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 31065 CVE ID:CVE-2008-3008 CNCVE ID:CNCVE-20083008 Microsoft Windows Media Encoder 9是一款视频音频编码工具。 Microsoft Windows Media Encoder 9包含的WMEX.DLL ActiveX存在缓冲区溢出,远程攻击者可以利用漏洞以应用程序权限执行任意指令。 构建特殊的WEB页,诱使用户访问,可触发此漏洞。目前没有详细漏洞细节提供。 Microsoft Windows Media Encoder 9 x64 + Microsoft Advanced Windows Media Plug-In for Adobe Premier 6.5 (Beta) Microsoft Windows Media Encoder 9 + Microsoft Advanced Windows Media Plug-In for Adobe Premier 6.5 (Beta) 可参考如下临时解决方案: -反注册WMEX.DLL 在管理员命令行中输入如下命令: regsvr32.exe -u &quot;C:\Program Files\Windows Media Components\Encoder\wmex.dll&quot; 要恢复反注册可在在管理员命令行中输入如下命令: regsvr32.exe &quot;C:\Program Files\Windows Media Components\Encoder\wmex.dll&quot; -xianzhi dui WMEX.DLL的访问: Windows 2000, Windows XP, 和Windows Server 2003中在管理员命令行中输入如下命令: Echo y| cacls &quot;C:\Program Files\Windows Media Components\Encoder\wmex.dll&quot; /E /P everyone:N 在Windows Vista和Windows Server 2008中在管理员命令行中输入如下命令: Takeown.exe /f &quot;C:\Program Files\Windows Media Components\Encoder\wmex.dll&quot; Icacls.exe &quot;C:\Program Files\Windows Media Components\Encoder\wmex.dll&quot; /save %TEMP%\WMEX_ACL.TXT Icacls.exe &quot;C:\Program Files\Windows Media Components\Encoder\wmex.dll&quot; /deny everyone:(F) 要恢复反注册: Windows 2000, Windows XP, 和Windows Server 2003中在管理员命令行中输入如下命令: cacls &quot;C:\Program Files\Windows Media Components\Encoder\wmex.dll&quot; /E /R everyone 在Windows Vista和Windows Server 2008中在管理员命令行中输入如下命令: icacls &quot;C:\Program Files\Windows Media Components\Encoder\wmex.dll&quot; /grant everyone:(F) icacls &quot;C:\Program Files\Windows Media Components\Encoder\wmex.dll&quot; /restore %TEMP%\WMEX_ACL.TXT 可参考如下补丁: Microsoft Windows Media Encoder 9 Microsoft Security Update for Windows Media Encoder 9 Series for Windows 2000 (KB954156) <a href=http://www.microsoft.com/downloads/details.aspx?FamilyID=0cabfbc0-db5d target=_blank>http://www.microsoft.com/downloads/details.aspx?FamilyID=0cabfbc0-db5d</a> -4a6a-a4cd-e6df89ac2b25 Microsoft Security Update for Windows Media Encoder 9 Series for Windows Server 2003 (KB954156) Windows Server 2003 Service Pack 1; Windows Server 2003 Service Pack 2 <a href=http://www.microsoft.com/downloads/details.aspx?FamilyID=54ce1080-94cf target=_blank>http://www.microsoft.com/downloads/details.aspx?FamilyID=54ce1080-94cf</a> -4e4f-8e09-a7dbab2757c5 Microsoft Security Update for Windows Media Encoder 9 Series for Windows Server 2008 (KB954156) Windows Server 2008 <a href=http://www.microsoft.com/downloads/details.aspx?FamilyID=5434ca66-5a6b target=_blank>http://www.microsoft.com/downloads/details.aspx?FamilyID=5434ca66-5a6b</a> -4517-92fb-72dea0a172ec Microsoft Security Update for Windows Media Encoder 9 Series for Windows Vista (KB954156) Windows Vista; Windows Vista Service Pack 1 <a href=http://www.microsoft.com/downloads/details.aspx?FamilyID=99beebc4-553a target=_blank>http://www.microsoft.com/downloads/details.aspx?FamilyID=99beebc4-553a</a> -46f8-8245-e3d932306c93 Microsoft Security Update for Windows Media Encoder 9 Series for Windows XP Windows XP Service Pack 2 and Windows XP Service Pack 3 <a href=http://www.microsoft.com/downloads/details.aspx?FamilyID=57bcb3c2-49d3 target=_blank>http://www.microsoft.com/downloads/details.aspx?FamilyID=57bcb3c2-49d3</a> -4f18-8d03-36abd03d7403 Microsoft Windows Media Encoder 9 x64 Microsoft Security Update for 32-bit Windows Media Encoder 9 Series for Windows Server 2003 x64 Edition (KB954 Windows Server 2003 Service Pack 2 x64 Edition; Windows Server 2003, Datacenter x64 Edition; Windows Server 2003, Enterprise x64 Edition; Windows Server 2003, Standard x64 Edition <a href=http://www.microsoft.com/downloads/details.aspx?FamilyID=c83011cd-90b8 target=_blank>http://www.microsoft.com/downloads/details.aspx?FamilyID=c83011cd-90b8</a> -494c-9cad-fa055e101992 Microsoft Security Update for 32-bit Windows Media Encoder 9 Series for Windows XP x64 Edition (KB954156) Windows Server 2003 Service Pack 2 x64 Edition; Windows XP Professional x64 Edition <a href=http://www.microsoft.com/downloads/details.aspx?FamilyID=18efea9e-b103 target=_blank>http://www.microsoft.com/downloads/details.aspx?FamilyID=18efea9e-b103</a> -46de-90d9-5e295854cec3 Microsoft Security Update for Windows Media Encoder 9 Series for Windows Server 2003 x64 Edition (KB954156) Windows Server 2003 Service Pack 2 x64 Edition; Windows Server 2003, Datacenter x64 Edition; Windows Server 2003, Enterprise x64 Edition; Windows Server 2003, Standard x64 Edition <a href=http://www.microsoft.com/downloads/details.aspx?FamilyId=d8f1b782-136b target=_blank>http://www.microsoft.com/downloads/details.aspx?FamilyId=d8f1b782-136b</a> -443f-b5f2-63aa4d1fd94a Microsoft Security Update for Windows Media Encoder 9 Series for Windows Server 2008 for x64 Edition (KB954156 Windows Server 2008 <a href=http://www.microsoft.com/downloads/details.aspx?FamilyId=e30f9427-26d0 target=_blank>http://www.microsoft.com/downloads/details.aspx?FamilyId=e30f9427-26d0</a> -4e86-b9b8-bc637c3b5734 Microsoft Security Update for Windows Media Encoder 9 Series for Windows Vista for x64-based Systems (KB954156 Windows Vista 64-bit Editions Service Pack 1; Windows Vista Business 64-bit edition; Windows Vista Enterprise 64-bit edition; Windows Vista Home Basic 64-bit edition; Windows Vista Home Premium 64-bit edition; Windows Vista Ultimate 64-bit edition <a href=http://www.microsoft.com/downloads/details.aspx?FamilyId=54d1279a-7f26 target=_blank>http://www.microsoft.com/downloads/details.aspx?FamilyId=54d1279a-7f26</a> -4727-a39d-5505bcd4fc53 Microsoft Security Update for Windows Media Encoder 9 Series for Windows XP x64 Edition Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2 <a href=http://www.microsoft.com/downloads/details.aspx?FamilyId=ebc1737c-6e78 target=_blank>http://www.microsoft.com/downloads/details.aspx?FamilyId=ebc1737c-6e78</a> -4244-a1b2-a56d031f16e9
idSSV:4015
last seen2017-11-19
modified2008-09-11
published2008-09-11
reporterRoot
titleMicrosoft Windows Media Encoder 9 'wmex.dll' ActiveX控件缓冲区溢出漏洞(MS08-055)