|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
Windows: code execution via HTTP.sys
Synthesis of the vulnerability
An attacker can send web queries to a service using HTTP.sys of Windows, such as IIS, in order to execute code.
Vulnerable software: IIS, Windows 2008 R2, Windows 2012, Windows 7, Windows 8.
Severity of this announce: 4/4.
Consequences of an intrusion: administrator access/rights, privileged access/rights, user access/rights.
Attacker's origin: internet client.
Creation date: 14/04/2015.
Revision date: 17/04/2015.
Références of this computer vulnerability: 3042553, CERTFR-2015-AVI-152, CVE-2015-1635, MS15-034, VIGILANCE-VUL-16597.
Description of the vulnerability
The Windows product uses the HTTP.sys driver to process HTTP queries.
However, a malicious query leads to code execution in HTTP.sys. The vulnerability is related to the processing of the Range header of HTTP.
An attacker can therefore send web queries to a service using HTTP.sys of Windows, such as IIS, in order to execute code.
Full Vigil@nce bulletin... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides a system vulnerability note. The Vigil@nce vulnerability database contains several thousand vulnerabilities. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.