First published: Wed Apr 15 2009(Updated: )
Windows HTTP Services (aka WinHTTP) in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, and Vista Gold allows remote web servers to impersonate arbitrary https web sites by using DNS spoofing to "forward a connection" to a different https web site that has a valid certificate matching its own domain name, but not a certificate matching the domain name of the host requested by the user, aka "Windows HTTP Services Certificate Name Mismatch Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =sp1 | |
Microsoft Windows Server | =sp1 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Vista | ||
Microsoft Windows Vista | =gold | |
Microsoft Windows Vista | =sp1 | |
Microsoft Windows XP | ||
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp3 | |
Microsoft Windows Vista | =sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0089 has a high severity rating as it allows remote web servers to impersonate arbitrary HTTPS websites.
To fix CVE-2009-0089, ensure your system is updated with the latest security patches from Microsoft.
CVE-2009-0089 affects Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, and Vista Gold.
CVE-2009-0089 can be exploited through DNS spoofing, enabling an attacker to redirect users to a malicious HTTPS site.
The potential impacts of CVE-2009-0089 include unauthorized access to sensitive information and credentials from users unknowingly connecting to fraudulent sites.