2009-2532 | Microsoft Windows EducatedScholar code injection (BID-36594 / EDB-9594)
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
9.5 | $0-$5k | 0.32 |
A vulnerability has been found in Microsoft Windows (Operating System) (affected version unknown) and classified as very critical. Affected by this vulnerability is an unknown function. The manipulation with an unknown input leads to a privilege escalation vulnerability (EducatedScholar). The CWE definition for the vulnerability is CWE-94. As an impact it is known to affect confidentiality, integrity, and availability. The summary by CVE is:
Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold and SP2, and Windows 7 RC do not properly process the command value in an SMB Multi-Protocol Negotiate Request packet, which allows remote attackers to execute arbitrary code via a crafted SMBv2 packet to the Server service, aka “SMBv2 Command Value Vulnerability.”
The weakness was shared 10/14/2009 (Website). The advisory is shared at us-cert.gov. This vulnerability is known as CVE-2009-2532 since 07/17/2009. The exploitation appears to be easy. The attack can be launched remotely. The exploitation doesn’t need any form of authentication. Technical details are unknown but an exploit is available. The price for an exploit might be around USD $0-$5k at the moment (estimation calculated on 08/23/2021).
It is declared as proof-of-concept. It is possible to download the exploit at exploit-db.com. We expect the 0-day to have been worth approximately $25k-$100k. The vulnerability scanner Nessus provides a plugin with the ID 42106 , which helps to determine the existence of the flaw in a target environment. The commercial vulnerability scanner Qualys is able to test this issue with plugin 90527 (Microsoft Server Message Block (SMBv2) Remote Code Execution Vulnerability (MS09-050) and Shadow Brokers (EDUCATEDSCHOLAR)).
Upgrading eliminates this vulnerability. Furthermore it is possible to detect and prevent this kind of attack with TippingPoint and the filter 8649.
The vulnerability is also documented in the databases at Vulnerability Center (SBV-23728), Tenable (42106) and Exploit-DB (9594). The entries 4031, 50451, 50448 and 50447 are related to this item.
Type
Vendor
Name
VulDB Meta Base Score: 10.0
VulDB Meta Temp Score: 9.5
VulDB Base Score: 10.0
VulDB Temp Score: 9.5
VulDB Vector: 🔍
VulDB Reliability: 🔍
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
🔍 | 🔍 | 🔍 | 🔍 | 🔍 | 🔍 |
🔍 | 🔍 | 🔍 | 🔍 | 🔍 | 🔍 |
🔍 | 🔍 | 🔍 | 🔍 | 🔍 | 🔍 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Name: EducatedScholar
Class: Privilege escalation / EducatedScholar
CWE: CWE-94
ATT&CK: Unknown
Local: No
Remote: Yes
Availability: 🔍
Status: Proof-of-Concept
Download: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Nessus ID: 42106
Nessus File: 🔍
Nessus Risk: 🔍
OpenVAS ID: 900965
OpenVAS Name: Microsoft Windows SMB2 Negotiation Protocol Remote Code Execution Vulnerability
OpenVAS File: 🔍
OpenVAS Family: 🔍
Exploit-DB: 🔍
Threat Intelligence
Interest: 🔍
Active Actors: 🔍
Active APT Groups: 🔍Recommended: Upgrade
Status: 🔍
0-Day Time: 🔍
Upgrade: us-cert.gov
TippingPoint: 🔍
PaloAlto IPS: 🔍
Fortigate IPS: 🔍
07/17/2009 🔍
10/13/2009 🔍
10/14/2009 🔍
10/14/2009 🔍
10/14/2009 🔍
03/18/2015 🔍
08/23/2021 🔍Vendor: https://www.microsoft.com/
Product: https://www.microsoft.com/en-us/windows
Advisory: us-cert.gov
Status: Not defined
CVE: CVE-2009-2532 (🔍)
OVAL: 🔍
Vulnerability Center: 23728 – [MS09-050] Microsoft Windows Vista and Server 2008 SMBv2 Remote Code Execution Vulnerability, Critical
SecurityFocus: 36594
See also: 🔍
Created: 03/18/2015 15:15
Updated: 08/23/2021 23:09
Changes: (2) source_nessus_risk source_exploitdb
Complete: 🔍
Check our Alexa App!