Integer underflow in Windows HTTP Services (aka WinHTTP) in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote HTTP servers to execute arbitrary code via crafted parameter values in a response, related to error handling, aka "Windows HTTP Services Integer Underflow Vulnerability."
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/53620 - | |
References | () http://secunia.com/advisories/34677 - | |
References | () http://www.securityfocus.com/bid/34435 - | |
References | () http://www.securitytracker.com/id?1022041 - | |
References | () http://www.us-cert.gov/cas/techalerts/TA09-104A.html - US Government Resource | |
References | () http://www.vupen.com/english/advisories/2009/1027 - | |
References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-013 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6149 - |
07 Dec 2023, 18:38
Type | Values Removed | Values Added |
---|---|---|
CPE |
Information
Published : 2009-04-15 08:00
Updated : 2024-11-21 00:59
NVD link : CVE-2009-0086
Mitre link : CVE-2009-0086
CVE.ORG link : CVE-2009-0086
JSON object : View
Products Affected
microsoft
- windows_vista
- windows_xp
- windows_2000
- windows_server_2003
- windows_server_2008
CWE
CWE-189
Numeric Errors