Vulnerabilities > CVE-2008-3008 - Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Microsoft products
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Stack-based buffer overflow in the WMEncProfileManager ActiveX control in wmex.dll in Microsoft Windows Media Encoder 9 Series allows remote attackers to execute arbitrary code via a long first argument to the GetDetailsString method, aka "Windows Media Encoder Buffer Overrun Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 | |
OS | 10 |
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Buffer Overflow via Environment Variables This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
- Overflow Buffers Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an attacker. As a consequence, an attacker is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the attackers' choice.
- Client-side Injection-induced Buffer Overflow This type of attack exploits a buffer overflow vulnerability in targeted client software through injection of malicious content from a custom-built hostile service.
- Filter Failure through Buffer Overflow In this attack, the idea is to cause an active filter to fail by causing an oversized transaction. An attacker may try to feed overly long input strings to the program in an attempt to overwhelm the filter (by causing a buffer overflow) and hoping that the filter does not fail securely (i.e. the user input is let into the system unfiltered).
- MIME Conversion An attacker exploits a weakness in the MIME conversion routine to cause a buffer overflow and gain control over the mail server machine. The MIME system is designed to allow various different information formats to be interpreted and sent via e-mail. Attack points exist when data are converted to MIME compatible format and back.
Exploit-Db
description Windows Media Encoder wmex.dll ActiveX BOF Exploit (MS08-053). CVE-2008-3008. Remote exploit for windows platform file exploits/windows/remote/6454.html id EDB-ID:6454 last seen 2016-01-31 modified 2008-09-13 platform windows port published 2008-09-13 reporter haluznik source https://www.exploit-db.com/download/6454/ title Windows Media Encoder XP SP2 - wmex.dll ActiveX BoF Exploit MS08-053 type remote description Windows Media Encoder 9 wmex.dll ActiveX Buffer Overflow. CVE-2008-3008. Remote exploit for windows platform id EDB-ID:16521 last seen 2016-02-02 modified 2010-05-09 published 2010-05-09 reporter metasploit source https://www.exploit-db.com/download/16521/ title Windows Media Encoder 9 wmex.dll ActiveX Buffer Overflow
Metasploit
description | This module exploits a stack buffer overflow in Windows Media Encoder 9. When sending an overly long string to the GetDetailsString() method of wmex.dll an attacker may be able to execute arbitrary code. |
id | MSF:EXPLOIT/WINDOWS/BROWSER/MS08_053_MEDIAENCODER |
last seen | 2020-05-26 |
modified | 2017-10-05 |
published | 2008-10-01 |
references | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3008 |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/browser/ms08_053_mediaencoder.rb |
title | Windows Media Encoder 9 wmex.dll ActiveX Buffer Overflow |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS08-053.NASL |
description | The remote host is running Windows Media Player 9. There is a vulnerability in the remote version of this software that could allow an attacker to execute arbitrary code on the remote host. To exploit this flaw, the attacker would need to set up a rogue web page and entice a victim to visit it. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 34121 |
published | 2008-09-10 |
reporter | This script is Copyright (C) 2008-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/34121 |
title | MS08-053: Vulnerability in Windows Media Encoder 9 Could Allow Remote Code Execution (954156) |
code |
|
Oval
accepted | 2014-08-18T04:06:07.263-04:00 | ||||||||||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||||||||||
description | Stack-based buffer overflow in the WMEncProfileManager ActiveX control in wmex.dll in Microsoft Windows Media Encoder 9 Series allows remote attackers to execute arbitrary code via a long first argument to the GetDetailsString method, aka "Windows Media Encoder Buffer Overrun Vulnerability." | ||||||||||||||||||||||||||||||||||||
family | windows | ||||||||||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:6018 | ||||||||||||||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||||||||||||||
submitted | 2008-09-09T13:58:00 | ||||||||||||||||||||||||||||||||||||
title | Windows Media Encoder Buffer Overrun Vulnerability | ||||||||||||||||||||||||||||||||||||
version | 30 |
Packetstorm
data source | https://packetstormsecurity.com/files/download/83176/ms08_053_mediaencoder.rb.txt |
id | PACKETSTORM:83176 |
last seen | 2016-12-05 |
published | 2009-11-26 |
reporter | MC |
source | https://packetstormsecurity.com/files/83176/Windows-Media-Encoder-9-wmex.dll-ActiveX-Buffer-Overflow.html |
title | Windows Media Encoder 9 wmex.dll ActiveX Buffer Overflow |
Saint
bid | 31065 |
description | Windows Media Encoder 9 wmex.dll ActiveX buffer overflow |
id | win_patch_wmex |
osvdb | 47962 |
title | windows_media_encoder_wmex |
type | client |
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 31065 CVE ID:CVE-2008-3008 CNCVE ID:CNCVE-20083008 Microsoft Windows Media Encoder 9是一款视频音频编码工具。 Microsoft Windows Media Encoder 9包含的WMEX.DLL ActiveX存在缓冲区溢出,远程攻击者可以利用漏洞以应用程序权限执行任意指令。 构建特殊的WEB页,诱使用户访问,可触发此漏洞。目前没有详细漏洞细节提供。 Microsoft Windows Media Encoder 9 x64 + Microsoft Advanced Windows Media Plug-In for Adobe Premier 6.5 (Beta) Microsoft Windows Media Encoder 9 + Microsoft Advanced Windows Media Plug-In for Adobe Premier 6.5 (Beta) 可参考如下临时解决方案: -反注册WMEX.DLL 在管理员命令行中输入如下命令: regsvr32.exe -u "C:\Program Files\Windows Media Components\Encoder\wmex.dll" 要恢复反注册可在在管理员命令行中输入如下命令: regsvr32.exe "C:\Program Files\Windows Media Components\Encoder\wmex.dll" -xianzhi dui WMEX.DLL的访问: Windows 2000, Windows XP, 和Windows Server 2003中在管理员命令行中输入如下命令: Echo y| cacls "C:\Program Files\Windows Media Components\Encoder\wmex.dll" /E /P everyone:N 在Windows Vista和Windows Server 2008中在管理员命令行中输入如下命令: Takeown.exe /f "C:\Program Files\Windows Media Components\Encoder\wmex.dll" Icacls.exe "C:\Program Files\Windows Media Components\Encoder\wmex.dll" /save %TEMP%\WMEX_ACL.TXT Icacls.exe "C:\Program Files\Windows Media Components\Encoder\wmex.dll" /deny everyone:(F) 要恢复反注册: Windows 2000, Windows XP, 和Windows Server 2003中在管理员命令行中输入如下命令: cacls "C:\Program Files\Windows Media Components\Encoder\wmex.dll" /E /R everyone 在Windows Vista和Windows Server 2008中在管理员命令行中输入如下命令: icacls "C:\Program Files\Windows Media Components\Encoder\wmex.dll" /grant everyone:(F) icacls "C:\Program Files\Windows Media Components\Encoder\wmex.dll" /restore %TEMP%\WMEX_ACL.TXT 可参考如下补丁: Microsoft Windows Media Encoder 9 Microsoft Security Update for Windows Media Encoder 9 Series for Windows 2000 (KB954156) <a href=http://www.microsoft.com/downloads/details.aspx?FamilyID=0cabfbc0-db5d target=_blank>http://www.microsoft.com/downloads/details.aspx?FamilyID=0cabfbc0-db5d</a> -4a6a-a4cd-e6df89ac2b25 Microsoft Security Update for Windows Media Encoder 9 Series for Windows Server 2003 (KB954156) Windows Server 2003 Service Pack 1; Windows Server 2003 Service Pack 2 <a href=http://www.microsoft.com/downloads/details.aspx?FamilyID=54ce1080-94cf target=_blank>http://www.microsoft.com/downloads/details.aspx?FamilyID=54ce1080-94cf</a> -4e4f-8e09-a7dbab2757c5 Microsoft Security Update for Windows Media Encoder 9 Series for Windows Server 2008 (KB954156) Windows Server 2008 <a href=http://www.microsoft.com/downloads/details.aspx?FamilyID=5434ca66-5a6b target=_blank>http://www.microsoft.com/downloads/details.aspx?FamilyID=5434ca66-5a6b</a> -4517-92fb-72dea0a172ec Microsoft Security Update for Windows Media Encoder 9 Series for Windows Vista (KB954156) Windows Vista; Windows Vista Service Pack 1 <a href=http://www.microsoft.com/downloads/details.aspx?FamilyID=99beebc4-553a target=_blank>http://www.microsoft.com/downloads/details.aspx?FamilyID=99beebc4-553a</a> -46f8-8245-e3d932306c93 Microsoft Security Update for Windows Media Encoder 9 Series for Windows XP Windows XP Service Pack 2 and Windows XP Service Pack 3 <a href=http://www.microsoft.com/downloads/details.aspx?FamilyID=57bcb3c2-49d3 target=_blank>http://www.microsoft.com/downloads/details.aspx?FamilyID=57bcb3c2-49d3</a> -4f18-8d03-36abd03d7403 Microsoft Windows Media Encoder 9 x64 Microsoft Security Update for 32-bit Windows Media Encoder 9 Series for Windows Server 2003 x64 Edition (KB954 Windows Server 2003 Service Pack 2 x64 Edition; Windows Server 2003, Datacenter x64 Edition; Windows Server 2003, Enterprise x64 Edition; Windows Server 2003, Standard x64 Edition <a href=http://www.microsoft.com/downloads/details.aspx?FamilyID=c83011cd-90b8 target=_blank>http://www.microsoft.com/downloads/details.aspx?FamilyID=c83011cd-90b8</a> -494c-9cad-fa055e101992 Microsoft Security Update for 32-bit Windows Media Encoder 9 Series for Windows XP x64 Edition (KB954156) Windows Server 2003 Service Pack 2 x64 Edition; Windows XP Professional x64 Edition <a href=http://www.microsoft.com/downloads/details.aspx?FamilyID=18efea9e-b103 target=_blank>http://www.microsoft.com/downloads/details.aspx?FamilyID=18efea9e-b103</a> -46de-90d9-5e295854cec3 Microsoft Security Update for Windows Media Encoder 9 Series for Windows Server 2003 x64 Edition (KB954156) Windows Server 2003 Service Pack 2 x64 Edition; Windows Server 2003, Datacenter x64 Edition; Windows Server 2003, Enterprise x64 Edition; Windows Server 2003, Standard x64 Edition <a href=http://www.microsoft.com/downloads/details.aspx?FamilyId=d8f1b782-136b target=_blank>http://www.microsoft.com/downloads/details.aspx?FamilyId=d8f1b782-136b</a> -443f-b5f2-63aa4d1fd94a Microsoft Security Update for Windows Media Encoder 9 Series for Windows Server 2008 for x64 Edition (KB954156 Windows Server 2008 <a href=http://www.microsoft.com/downloads/details.aspx?FamilyId=e30f9427-26d0 target=_blank>http://www.microsoft.com/downloads/details.aspx?FamilyId=e30f9427-26d0</a> -4e86-b9b8-bc637c3b5734 Microsoft Security Update for Windows Media Encoder 9 Series for Windows Vista for x64-based Systems (KB954156 Windows Vista 64-bit Editions Service Pack 1; Windows Vista Business 64-bit edition; Windows Vista Enterprise 64-bit edition; Windows Vista Home Basic 64-bit edition; Windows Vista Home Premium 64-bit edition; Windows Vista Ultimate 64-bit edition <a href=http://www.microsoft.com/downloads/details.aspx?FamilyId=54d1279a-7f26 target=_blank>http://www.microsoft.com/downloads/details.aspx?FamilyId=54d1279a-7f26</a> -4727-a39d-5505bcd4fc53 Microsoft Security Update for Windows Media Encoder 9 Series for Windows XP x64 Edition Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2 <a href=http://www.microsoft.com/downloads/details.aspx?FamilyId=ebc1737c-6e78 target=_blank>http://www.microsoft.com/downloads/details.aspx?FamilyId=ebc1737c-6e78</a> -4244-a1b2-a56d031f16e9 |
id | SSV:4015 |
last seen | 2017-11-19 |
modified | 2008-09-11 |
published | 2008-09-11 |
reporter | Root |
title | Microsoft Windows Media Encoder 9 'wmex.dll' ActiveX控件缓冲区溢出漏洞(MS08-055) |
References
- http://marc.info/?l=bugtraq&m=122235754013992&w=2
- http://www.kb.cert.org/vuls/id/996227
- http://www.securityfocus.com/bid/31065
- http://www.securitytracker.com/id?1020832
- http://www.us-cert.gov/cas/techalerts/TA08-253A.html
- http://www.vupen.com/english/advisories/2008/2521
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-053
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6018
- https://www.exploit-db.com/exploits/6454