ID

VAR-200906-0257


CVE

CVE-2009-1122


TITLE

Windows Running on Microsoft IIS of WebDAV Vulnerabilities that prevent authentication from being extended

Trust: 0.8

sources: JVNDB: JVNDB-2009-001787

DESCRIPTION

The WebDAV extension in Microsoft Internet Information Services (IIS) 5.0 on Windows 2000 SP4 does not properly decode URLs, which allows remote attackers to bypass authentication, and possibly read or create files, via a crafted HTTP request, aka "IIS 5.0 WebDAV Authentication Bypass Vulnerability," a different vulnerability than CVE-2009-1535. An attacker can exploit this issue to gain unauthorized access to protected resources, which may lead to other attacks. This issue affects IIS 5.0. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA09-160A Microsoft Updates for Multiple Vulnerabilities Original release date: June 09, 2009 Last revised: -- Source: US-CERT Systems Affected * Microsoft Windows * Microsoft Office * Microsoft Internet Explorer Overview Microsoft has released updates that address vulnerabilities in Microsoft Windows, Office, and Internet Explorer. I. Description As part of the Microsoft Security Bulletin Summary for June 2009, Microsoft released updates to address vulnerabilities that affect Microsoft Windows, Office, and Internet Explorer. II. Impact A remote, unauthenticated attacker could execute arbitrary code, gain elevated privileges, or cause a vulnerable application to crash. III. Solution Microsoft has provided updates for these vulnerabilities in the Microsoft Security Bulletin Summary for June 2009. The security bulletin describes any known issues related to the updates. Administrators are encouraged to note these issues and test for any potentially adverse effects. Administrators should consider using an automated update distribution system such as Windows Server Update Services (WSUS). IV. References * Microsoft Security Bulletin Summary for June 2009 - <http://www.microsoft.com/technet/security/bulletin/ms09-jun.mspx> * Microsoft Windows Server Update Services - <http://technet.microsoft.com/en-us/wsus/default.aspx> * US-CERT Vulnerability Notes for Microsoft June 2009 updates - <http://www.kb.cert.org/vuls/byid?searchview&query=ms09-jun> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA09-160A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA09-160A Feedback VU#983731" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2009 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History June 09, 2009: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iQEVAwUBSi7EY3IHljM+H4irAQKpUwgAqcYG1SVf4dPt7wevUx9UIKyw/RWG/wCI +ns9UEmk4Pbdu8Tj+snDsNxxOnvdUGnWzfbuBFrzexr+u3zY0BgvBQ50eaYnYyVn Iv9yxxxKfdvQEQIiPi/5gWl05k4axYdSjEYLZqNkQIj1VvqJOhCWaHKPsJZykdZq ZZLd8aFxxM7fj0RrKeorXGiApw45kP9a133EN7NRf8CvYsNKnUTMYVPC2bTaq0Jb HCjjEOwBWaP6YjqQ1laVslCHzOVpFzQnkl+IKBsoDAu1397KjwobIR340YyW6K4g ckdod5TwdG77KOcNZHAp+uQMffGOaCfqj/MFk7qEYxN7/0gJXuB8mQ== =9e4w -----END PGP SIGNATURE-----

Trust: 2.07

sources: NVD: CVE-2009-1122 // JVNDB: JVNDB-2009-001787 // BID: 35232 // VULMON: CVE-2009-1122 // PACKETSTORM: 78216

AFFECTED PRODUCTS

vendor:microsoftmodel:iisscope:eqversion:5.0

Trust: 1.7

vendor:microsoftmodel:internet information servicesscope:eqversion:5.0

Trust: 1.0

vendor:microsoftmodel:windows 2000scope: - version: -

Trust: 0.8

vendor:avayamodel:messaging application server mmscope:eqversion:3.1

Trust: 0.3

vendor:avayamodel:messaging application server mmscope:eqversion:3.0

Trust: 0.3

vendor:avayamodel:messaging application server mmscope:eqversion:2.0

Trust: 0.3

vendor:avayamodel:messaging application server mmscope:eqversion:1.1

Trust: 0.3

vendor:avayamodel:messaging application serverscope:eqversion:0

Trust: 0.3

sources: BID: 35232 // JVNDB: JVNDB-2009-001787 // CNNVD: CNNVD-200906-150 // NVD: CVE-2009-1122

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-1122
value: HIGH

Trust: 1.0

NVD: CVE-2009-1122
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200906-150
value: HIGH

Trust: 0.6

VULMON: CVE-2009-1122
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2009-1122
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: CVE-2009-1122
severity: HIGH
baseScore: 7.6
vectorString: AV:N/AC:H/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

sources: VULMON: CVE-2009-1122 // JVNDB: JVNDB-2009-001787 // CNNVD: CNNVD-200906-150 // NVD: CVE-2009-1122

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.8

sources: JVNDB: JVNDB-2009-001787 // NVD: CVE-2009-1122

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200906-150

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-200906-150

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-001787

EXPLOIT AVAILABILITY

sources: VULMON: CVE-2009-1122

PATCH

title:MS09-020url:http://www.microsoft.com/technet/security/bulletin/MS09-020.mspx

Trust: 0.8

title:MS09-020url:http://www.microsoft.com/japan/technet/security/bulletin/ms09-020.mspx

Trust: 0.8

title:MS09-020eurl:http://www.microsoft.com/japan/security/bulletins/MS09-020e.mspx

Trust: 0.8

title:TA09-160Aurl:http://software.fujitsu.com/jp/security/vulnerabilities/ta09-160a.html

Trust: 0.8

title:WindowsPrivilegeEscalation 2023 2022 2021 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2003 2000url:https://github.com/ycdxsb/WindowsPrivilegeEscalation

Trust: 0.1

sources: VULMON: CVE-2009-1122 // JVNDB: JVNDB-2009-001787

EXTERNAL IDS

db:BIDid:35232

Trust: 2.8

db:NVDid:CVE-2009-1122

Trust: 2.8

db:USCERTid:TA09-160A

Trust: 2.6

db:SECTRACKid:1022358

Trust: 2.5

db:VUPENid:ADV-2009-1539

Trust: 2.5

db:USCERTid:SA09-160A

Trust: 0.8

db:CERT/CCid:VU#787932

Trust: 0.8

db:JVNDBid:JVNDB-2009-001787

Trust: 0.8

db:CNNVDid:CNNVD-200906-150

Trust: 0.6

db:EXPLOIT-DBid:8806

Trust: 0.1

db:VULMONid:CVE-2009-1122

Trust: 0.1

db:PACKETSTORMid:78216

Trust: 0.1

sources: VULMON: CVE-2009-1122 // BID: 35232 // JVNDB: JVNDB-2009-001787 // PACKETSTORM: 78216 // CNNVD: CNNVD-200906-150 // NVD: CVE-2009-1122

REFERENCES

url:http://www.securitytracker.com/id?1022358

Trust: 2.5

url:http://www.securityfocus.com/bid/35232

Trust: 2.5

url:http://www.vupen.com/english/advisories/2009/1539

Trust: 2.5

url:http://www.us-cert.gov/cas/techalerts/ta09-160a.html

Trust: 2.5

url:http://www.attrition.org/pipermail/vim/2009-june/002192.html

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5861

Trust: 1.7

url:https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-020

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1122

Trust: 0.8

url:http://www.jpcert.or.jp/at/2009/at090011.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnta09-160a/

Trust: 0.8

url:http://jvn.jp/cert/jvnvu787932/

Trust: 0.8

url:http://jvn.jp/tr/jvntr-2009-14

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-1122

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa09-160a.html

Trust: 0.8

url:http://www.kb.cert.org/vuls/id/787932

Trust: 0.8

url:http://www.cyberpolice.go.jp/#topics

Trust: 0.8

url:http://www.microsoft.com/windowsserver2003/iis/default.mspx

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2009-215.htm

Trust: 0.3

url:http://www.microsoft.com/technet/security/bulletin/ms09-020.mspx

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/287.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.rapid7.com/db/modules/auxiliary/scanner/http/ms09_020_webdav_unicode_bypass

Trust: 0.1

url:https://www.exploit-db.com/exploits/8806/

Trust: 0.1

url:http://www.microsoft.com/technet/security/bulletin/ms09-jun.mspx>

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta09-160a.html>

Trust: 0.1

url:http://technet.microsoft.com/en-us/wsus/default.aspx>

Trust: 0.1

url:http://www.kb.cert.org/vuls/byid?searchview&query=ms09-jun>

Trust: 0.1

sources: VULMON: CVE-2009-1122 // BID: 35232 // JVNDB: JVNDB-2009-001787 // PACKETSTORM: 78216 // CNNVD: CNNVD-200906-150 // NVD: CVE-2009-1122

CREDITS

Yamata Li

Trust: 0.9

sources: BID: 35232 // CNNVD: CNNVD-200906-150

SOURCES

db:VULMONid:CVE-2009-1122
db:BIDid:35232
db:JVNDBid:JVNDB-2009-001787
db:PACKETSTORMid:78216
db:CNNVDid:CNNVD-200906-150
db:NVDid:CVE-2009-1122

LAST UPDATE DATE

2024-11-23T21:21:54.327000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2009-1122date:2020-11-23T00:00:00
db:BIDid:35232date:2009-06-18T16:30:00
db:JVNDBid:JVNDB-2009-001787date:2009-07-22T00:00:00
db:CNNVDid:CNNVD-200906-150date:2021-08-16T00:00:00
db:NVDid:CVE-2009-1122date:2024-11-21T01:01:43.587

SOURCES RELEASE DATE

db:VULMONid:CVE-2009-1122date:2009-06-10T00:00:00
db:BIDid:35232date:2009-06-09T00:00:00
db:JVNDBid:JVNDB-2009-001787date:2009-07-22T00:00:00
db:PACKETSTORMid:78216date:2009-06-10T20:55:09
db:CNNVDid:CNNVD-200906-150date:2009-06-10T00:00:00
db:NVDid:CVE-2009-1122date:2009-06-10T18:30:00.297