The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Vulnerability of Microsoft Indexing Service: code execution

Synthesis of the vulnerability

An attacker can invite the victim using Indexing Service to connect to a malicious IIS web server, in order to execute code on his computer.
Severity of this alert: 3/4.
Creation date: 14/10/2009.
Références of this alert: 969059, BID-36629, CERTA-2009-AVI-437, CVE-2009-2507, MS09-057, VIGILANCE-VUL-9089.

Description of the vulnerability

The Microsoft Indexing Service analyzes and indexes local documents, or remote documents located on an IIS web server. When the user connects to an IIS server, Internet Explorer calls the ixsso.dll ActiveX to index the web site.

However, if the url of the web site is malformed, an memory corruption occurs in this ActiveX.

An attacker can therefore invite the victim using Indexing Service to connect to a malicious IIS web server, in order to execute code on his computer.
Full Vigil@nce bulletin... (Free trial)

This computer threat note impacts software or systems such as Microsoft Indexing Service, Windows 2000, Windows 2003, Windows XP.

Our Vigil@nce team determined that the severity of this weakness alert is important.

The trust level is of type confirmed by the editor, with an origin of internet server.

An attacker with a expert ability can exploit this computer weakness note.

Solutions for this threat

Microsoft Indexing Service: patch.
The Microsoft announce indicates patches and workarounds.
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a computer vulnerability workaround. Each administrator can customize the list of products for which he wants to receive vulnerability alerts.