Vulnerabilities > CVE-2008-3009 - Credentials Management vulnerability in Microsoft products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Microsoft Windows Media Player 6.4, Windows Media Format Runtime 7.1 through 11, and Windows Media Services 4.1, 9, and 2008 do not properly use the Service Principal Name (SPN) identifier when validating replies to authentication requests, which allows remote servers to execute arbitrary code via vectors that employ NTLM credential reflection, aka "SPN Vulnerability."
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Msbulletin
bulletin_id | MS08-076 |
bulletin_url | |
date | 2008-12-09T00:00:00 |
impact | Remote Code Execution |
knowledgebase_id | 959349 |
knowledgebase_url | |
severity | Important |
title | Vulnerabilities in Windows Media Components Could Allow Remote Code Execution |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS08-076.NASL |
description | The remote host is running Windows Media Player/Components. There is a vulnerability in the remote version of this software that may allow an attacker to execute arbitrary code on the remote host thru flaws in ISATAP and SPN. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 35075 |
published | 2008-12-10 |
reporter | This script is Copyright (C) 2008-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/35075 |
title | MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution (959807) |
code |
|
Oval
accepted | 2014-08-18T04:06:05.949-04:00 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
description | Microsoft Windows Media Player 6.4, Windows Media Format Runtime 7.1 through 11, and Windows Media Services 4.1, 9, and 2008 do not properly use the Service Principal Name (SPN) identifier when validating replies to authentication requests, which allows remote servers to execute arbitrary code via vectors that employ NTLM credential reflection, aka "SPN Vulnerability." | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
family | windows | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:5942 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
submitted | 2008-12-10T10:44:00 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
title | SPN Vulnerability | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
version | 78 |
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 32653 CVE(CAN) ID: CVE-2008-3009 Windows媒体组件包括Windows Media Player、Windows Media Format Runtime和Windows Media Services等多种服务和应用。 Windows媒体组件在使用NTLM认证协议(具体来说,是SPN)的方式存在安全漏洞。在访问媒体之前,服务器会提示一些使用Windows媒体组件的媒体播放器(如Windows Media Player)要求进行认证,然后客户端会在响应中发送当前用户的凭据,可能为使用NTLM的凭据。如果服务器为恶意服务器的话,就可能使用所接收到的NTLM凭据对客户端执行反射攻击。 请注意Windows Media媒体组件是区分区域的,也就是说在从服务器检索媒体时,要判断服务器是处于本地Intranet区还是Internet区。处于Internet区中的服务器是不受信任的,未经提示用户Windows媒体组件不会向该区中的服务器发送NTLM凭据。因此,如果要利用SPN漏洞,攻击者必须处于本地Intranet(也就是与受害用户处于同一子网)或能够诱骗系统用Internet中的机器执行NTLM认证。 Microsoft Windows Media Player 6.4 Microsoft Windows Media Services 9.1 Microsoft Windows Media Services 9.0 Series Microsoft Windows Media Services 4.1 Microsoft Windows Media Services 2008 Microsoft Windows Media Format Runtime 9.5 Microsoft Windows Media Format Runtime 9 Microsoft Windows Media Format Runtime 7.1 Microsoft Windows Media Format Runtime 11 Microsoft --------- Microsoft已经为此发布了一个安全公告(MS08-076)以及相应补丁: MS08-076:Vulnerabilities in Windows Media Components Could Allow Remote Code Execution (959807) 链接:<a href=http://www.microsoft.com/technet/security/Bulletin/ms08-076.mspx?pf=true target=_blank>http://www.microsoft.com/technet/security/Bulletin/ms08-076.mspx?pf=true</a> |
id | SSV:4553 |
last seen | 2017-11-19 |
modified | 2008-12-11 |
published | 2008-12-11 |
reporter | Root |
title | Microsoft Windows媒体组件SPN实现远程代码执行漏洞(MS08-076) |
References
- http://secunia.com/advisories/33058
- http://secunia.com/advisories/33058
- http://www.securityfocus.com/bid/32653
- http://www.securityfocus.com/bid/32653
- http://www.securitytracker.com/id?1021372
- http://www.securitytracker.com/id?1021372
- http://www.securitytracker.com/id?1021373
- http://www.securitytracker.com/id?1021373
- http://www.us-cert.gov/cas/techalerts/TA08-344A.html
- http://www.us-cert.gov/cas/techalerts/TA08-344A.html
- http://www.vupen.com/english/advisories/2008/3388
- http://www.vupen.com/english/advisories/2008/3388
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-076
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-076
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5942
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5942