Lucene search

K
openvasCopyright (C) 2009 SecPodOPENVAS:900877
HistoryOct 14, 2009 - 12:00 a.m.

Microsoft Windows LSASS Denial of Service Vulnerability (975467)

2009-10-1400:00:00
Copyright (C) 2009 SecPod
plugins.openvas.org
7

0.838 High

EPSS

Percentile

98.5%

This host is missing a critical security update according to
Microsoft Bulletin MS09-059.

###############################################################################
# OpenVAS Vulnerability Test
# $Id: secpod_ms09-059.nasl 8724 2018-02-08 15:02:56Z cfischer $
#
# Microsoft Windows LSASS Denial of Service Vulnerability (975467)
#
# Authors:
# Sharath S <[email protected]>
#
# Updated By: Madhuri D <[email protected]> on 2010-11-24
#    - To detect file version 'Msv1_0.dll' on vista, win 2008 and 7
# 
# Copyright:
# Copyright (c) 2009 SecPod, http://www.secpod.com
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################

if(description)
{
  script_id(900877);
  script_version("$Revision: 8724 $");
  script_tag(name:"last_modification", value:"$Date: 2018-02-08 16:02:56 +0100 (Thu, 08 Feb 2018) $");
  script_tag(name:"creation_date", value:"2009-10-14 16:47:08 +0200 (Wed, 14 Oct 2009)");
  script_tag(name:"cvss_base", value:"7.8");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:C");
  script_cve_id("CVE-2009-2524");
  script_bugtraq_id(36593);
  script_name("Microsoft Windows LSASS Denial of Service Vulnerability (975467)");
  script_xref(name : "URL" , value : "http://support.microsoft.com/kb/975467");
  script_xref(name : "URL" , value : "http://www.vupen.com/english/advisories/2009/2894");
  script_xref(name : "URL" , value : "http://www.microsoft.com/technet/security/bulletin/MS09-059.mspx");

  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2009 SecPod");
  script_family("Windows : Microsoft Bulletins");
  script_dependencies("secpod_reg_enum.nasl");
  script_require_ports(139, 445);
  script_mandatory_keys("SMB/WindowsVersion");

  script_tag(name : "impact" , value : "Successful exploitation will allow remote attackers to cause a Denial of
  Service on the victim's system.

  Impact Level: System");
  script_tag(name : "affected" , value : "Microsoft Windows 7

  Microsoft Windows XP  Service Pack 3 and prior.

  Microsoft Windows 2K3 Service Pack 2 and prior.

  Microsoft Windows Vista Service Pack 1/2 and prior.

  Microsoft Windows Server 2008 Service Pack 1/2 and prior.");
  script_tag(name : "insight" , value : "This issue is caused by an integer underflow error in the Windows NTLM
  implementation in LSASS (Local Security Authority Subsystem Service) when
  processing malformed packets during the authentication process, which could
  allow attackers to cause an affected system to automatically reboot.");
  script_tag(name : "solution" , value : "Run Windows Update and update the listed hotfixes or download and
  update mentioned hotfixes in the advisory from the below link.

  http://www.microsoft.com/technet/security/bulletin/ms09-059.mspx");
  script_tag(name : "summary" , value : "This host is missing a critical security update according to
  Microsoft Bulletin MS09-059.");
  script_tag(name:"qod_type", value:"registry");
  script_tag(name:"solution_type", value:"VendorFix");
  exit(0);
}


include("smb_nt.inc");
include("secpod_reg.inc");
include("version_func.inc");
include("secpod_smb_func.inc");

if(hotfix_check_sp(xp:4, win2003:3, winVista:3, win7:1, win2008:3) <= 0){
  exit(0);
}

# Check KB968389 is installed, vulnerability exists only if this is installed.
if(hotfix_missing(name:"968389") == 1){
  exit(0);
}

# MS09-059 Hotfix check
if(hotfix_missing(name:"975467") == 0){
  exit(0);
}

## Get System32 path
sysPath = smb_get_system32root();
if(sysPath)
{
  dllVer = fetch_file_version(sysPath, file_name:"Msv1_0.dll");
  if(!dllVer){
    exit(0);
  }
}

# Windows XP
if(hotfix_check_sp(xp:4) > 0)
{
  SP = get_kb_item("SMB/WinXP/ServicePack");
  if("Service Pack 2" >< SP)
  {
    # Grep for Msv1_0.dll < 5.1.2600.3625
    if(version_is_less(version:dllVer, test_version:"5.1.2600.3625")){
      security_message(0);
    }
    exit(0);
  }
  else if("Service Pack 3" >< SP)
  {
    # Grep for Msv1_0.dll < 5.1.2600.5876
    if(version_is_less(version:dllVer, test_version:"5.1.2600.5876")){
      security_message(0);
    }
    exit(0);
  }
  security_message(0);
}
# Windows 2003
else if(hotfix_check_sp(win2003:3) > 0)
{
  SP = get_kb_item("SMB/Win2003/ServicePack");
  if("Service Pack 2" >< SP)
  {
    # Grep for Msv1_0.dll version < 5.2.3790.4587
    if(version_is_less(version:dllVer, test_version:"5.2.3790.4587")){
      security_message(0);
    }
     exit(0);
  }
  security_message(0);
}

## Get System32 path
sysPath = smb_get_system32root();
if(sysPath)
{
  dllVer = fetch_file_version(sysPath, file_name:"Msv1_0.dll");
  if(!dllVer){
    exit(0);
  }
}

# Windows Vista
if(hotfix_check_sp(winVista:3) > 0)
{
  SP = get_kb_item("SMB/WinVista/ServicePack");
  if("Service Pack 1" >< SP)
  {
    # Grep for Msv1_0.dll version < 6.0.6001.18330
    if(version_is_less(version:dllVer, test_version:"6.0.6001.18330")){
      security_message(0);
    }
      exit(0);
  }

  if("Service Pack 2" >< SP)
  {
    # Grep for Msv1_0.dll version < 6.0.6002.18111
      if(version_is_less(version:dllVer, test_version:"6.0.6002.18111")){
      security_message(0);
    }
      exit(0);
  }
  security_message(0);
}

# Windows Server 2008
else if(hotfix_check_sp(win2008:3) > 0)
{
  SP = get_kb_item("SMB/Win2008/ServicePack");
  if("Service Pack 1" >< SP)
  {
    # Grep for Msv1_0.dll version < 6.0.6001.18330
    if(version_is_less(version:dllVer, test_version:"6.0.6001.18330")){
      security_message(0);
    }
     exit(0);
  }

  if("Service Pack 2" >< SP)
  {
    # Grep for Msv1_0.dll version < 6.0.6002.18111
    if(version_is_less(version:dllVer, test_version:"6.0.6002.18111")){
      security_message(0);
    }
    exit(0);
  }
 security_message(0);
}

# Windows 7
else if(hotfix_check_sp(win7:1) > 0)
{
  # Grep for Msv1_0.dll version < 
  if(version_is_less(version:dllVer, test_version:"6.1.7600.16420")){
     security_message(0);
  }
}

0.838 High

EPSS

Percentile

98.5%