Vulnerability in Web Services on Devices (WSD) API (2024)

MS09-063 addresses a critical vulnerability (CVE-2009-2512) in the Web Services on Devices (WSD) API. Web Services on Devices allows a computer to discover and access a remote device and its associated services across a network. It supports device discovery, description, control, and eventing.

The WSD API functionality is implemented in the WSDApi.dll module in Windows, and is used by several services and applications. The API is also documented on MSDN for 3rd party developers to use. Therefore, a comprehensive list of services and application that are vulnerable to this issue is hard to define, but here are some examples:

· Print Spooler service

· Function Discovery Resource Publication service

· Function Discovery Provider Host service

· Windows Network Projector

There are mitigating factors that limit the scenarios where the vulnerability can be exploited. We will describe the vulnerability and mitigating factors in more detail in this blog post.

What is the issue?

A long header value within a WSD message can lead to stack corruption within the process hosting WSDApi.dll. This can cause the service or application to crash, or could lead to Remote Code Execution. To be clear, the vulnerability is in the Windows module used to interact with devices that support Web Services on Devices, and does not affect the devices themselves.

What platforms are affected?

Windows Vista and Windows Server 2008 are affected. WSDAPI was introduced in Windows Vista and hence earlier versions of Windows are not vulnerable.

Only systems with the WSD TCP ports active and listening are vulnerable to the most likely attack vector. Whether a system has WSD ports active and listening depends on the system configuration and applications that are installed.

What are the attack vectors?

By default, WSDAPI will listen on TCP ports 5357 and 5358. The Windows Firewall will allow messages in to these ports if the interface firewall profile is anything other than Public. This means under non-Public profiles (e.g. Private or Domain) the vulnerability can be reached by remote, unauthenticated users.

For an attacker to be able to trigger the vulnerability on a target, they need to know the WSD Address value for the target, which is a UUID (Universally Unique Identifier). This value is automatically sent in broadcast UDP messages to port 3702 (WS-Discovery) in an effort to discover devices that support WSD. Being broadcast UDP the message will only be visible to attackers on the same subnet. Attackers on other subnets, or on the Internet, will not be able to launch attacks against distant targets using this approach.

A system could also be exploited by a malicious device which responds to a client computer using WSDAPI. It is possible for the user to manually enter the URL of a device to connect to, in which case the device could respond with a malformed message and trigger the vulnerability. This requires user-interaction and social engineering, however.

Mitigating factors

As explained above, the most common exploit scenario requires that the attacker is on the same subnet as the target system in order for the target’s WSD Address to be discovered.

The default Windows Firewall rules limit inbound WSD messages to sources on the local subnet for Private and Domain profiles. The Public firewall profile blocks WSD messages completely.

If WSD functionality is not needed, the security bulletin provides information on using the Windows Firewall to block the inbound and outbound ports used to trigger this vulnerability.

I’d like to thank Rob Hain and Dan Driscoll from the WSD team, and Kevin Brown from MSRC Engineering for their work on this issue.

- Mark Wodrich, MSRC Engineering

Vulnerability in Web Services on Devices (WSD) API (2024)
Top Articles
Illegal? Unethical? Troubling Airbnb Problems You Didn’t Know
Top Meme Stocks of 2024 | The Motley Fool
Dainty Rascal Io
Srtc Tifton Ga
Dte Outage Map Woodhaven
Canary im Test: Ein All-in-One Überwachungssystem? - HouseControllers
Plaza Nails Clifton
What to Serve with Lasagna (80+ side dishes and wine pairings)
Coffman Memorial Union | U of M Bookstores
Raid Guides - Hardstuck
Sarpian Cat
Nebraska Furniture Tables
Teenleaks Discord
Northern Whooping Crane Festival highlights conservation and collaboration in Fort Smith, N.W.T. | CBC News
Bj Alex Mangabuddy
Energy Healing Conference Utah
Huntersville Town Billboards
Little Caesars 92Nd And Pecos
Lola Bunny R34 Gif
Heart Ring Worth Aj
Rufus Benton "Bent" Moulds Jr. Obituary 2024 - Webb & Stephens Funeral Homes
Tripadvisor Napa Restaurants
Is Windbound Multiplayer
Like Some Annoyed Drivers Wsj Crossword
Southwest Flight 238
University Of Michigan Paging System
Poochies Liquor Store
Nk 1399
Tom Thumb Direct2Hr
Santa Barbara Craigs List
Pay Stub Portal
How often should you visit your Barber?
Missing 2023 Showtimes Near Grand Theatres - Bismarck
Kips Sunshine Kwik Lube
Uc Santa Cruz Events
Michael Jordan: A timeline of the NBA legend
Skip The Games Grand Rapids Mi
Columbia Ms Buy Sell Trade
Newsweek Wordle
Guy Ritchie's The Covenant Showtimes Near Grand Theatres - Bismarck
Sallisaw Bin Store
Comanche Or Crow Crossword Clue
Hanco*ck County Ms Busted Newspaper
Dragon Ball Super Card Game Announces Next Set: Realm Of The Gods
Advance Auto.parts Near Me
Enter The Gungeon Gunther
Gelato 47 Allbud
Assignation en paiement ou injonction de payer ?
300 Fort Monroe Industrial Parkway Monroeville Oh
Ravenna Greataxe
Latest Posts
Article information

Author: Catherine Tremblay

Last Updated:

Views: 6549

Rating: 4.7 / 5 (67 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Catherine Tremblay

Birthday: 1999-09-23

Address: Suite 461 73643 Sherril Loaf, Dickinsonland, AZ 47941-2379

Phone: +2678139151039

Job: International Administration Supervisor

Hobby: Dowsing, Snowboarding, Rowing, Beekeeping, Calligraphy, Shooting, Air sports

Introduction: My name is Catherine Tremblay, I am a precious, perfect, tasty, enthusiastic, inexpensive, vast, kind person who loves writing and wants to share my knowledge and understanding with you.