First published: Wed Apr 15 2009(Updated: )
Integer underflow in Windows HTTP Services (aka WinHTTP) in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote HTTP servers to execute arbitrary code via crafted parameter values in a response, related to error handling, aka "Windows HTTP Services Integer Underflow Vulnerability."
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows Server 2003 | ||
Microsoft Windows Server 2003 | =sp1 | |
Microsoft Windows Server 2003 | =sp1 | |
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows Vista | ||
Microsoft Windows Vista | ||
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Vista | =gold | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp3 | |
Microsoft Windows Vista | =sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0086 is rated as a critical vulnerability due to its potential to allow remote code execution.
To mitigate CVE-2009-0086, it is recommended to install the latest security updates provided by Microsoft for affected Windows versions.
CVE-2009-0086 affects multiple versions including Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista, and Server 2008.
CVE-2009-0086 can be exploited through crafted parameter values in HTTP responses from remote servers.
A temporary workaround for CVE-2009-0086 includes restricting access to vulnerable services or disabling unnecessary HTTP features.