First published: Wed Mar 11 2009(Updated: )
The WINS server in Microsoft Windows 2000 SP4 and Server 2003 SP1 and SP2 does not restrict registration of the (1) "wpad" and (2) "isatap" NetBIOS names, which allows remote authenticated users to hijack the Web Proxy Auto-Discovery (WPAD) and Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) features, and conduct man-in-the-middle attacks by spoofing a proxy server or ISATAP route, by registering one of these names in the WINS database, aka "WPAD WINS Server Registration Vulnerability," a related issue to CVE-2007-1692.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =sp1 | |
Microsoft Windows Server | =sp1 | |
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0094 is considered a high severity vulnerability due to the potential for remote authenticated users to hijack crucial network protocols.
To fix CVE-2009-0094, it is recommended to apply the latest security patches provided by Microsoft for vulnerable versions of Windows.
CVE-2009-0094 affects Microsoft Windows 2000 SP4 and Windows Server 2003 SP1 and SP2.
CVE-2009-0094 can allow unauthorized access to web proxy auto-discovery and intra-site tunneling, compromising network confidentiality.
To mitigate CVE-2009-0094, consider disabling the registration of 'wpad' and 'isatap' NetBIOS names until a patch can be applied.