CERT-In Vulnerability Note
CIVN-2011-0173
Microsoft Windows TCP/IP Stack Integer Overflow Arbitrary Code Execution Vulnerability
Original Issue Date:November 09, 2011
Severity Rating: HIGH
Systems Affected
- Windows Vista SP2 and prior
- Windows Vista x64 Edition SP2 and prior
- Windows Server 2008 for 32-bit Systems SP2 and prior
- Windows Server 2008 for x64-based Systems SP2 and prior
- Windows Server 2008 for Itanium-based Systems SP2 and prior
- Windows 7 for 32-bit Systems SP1 and prior
- Windows 7 for x64-based Systems SP1 and prior
- Windows Server 2008 R2 for x64-based Systems SP1 and prior
- Windows Server 2008 R2 for Itanium-based Systems SP1 and prior
Overview
A vulnerability has been reported in Microsoft Windows that could allow a remote attacker to execute arbitrary code on a targeted system with elevated privileges.
Description
The vulnerability exists because of errors in processing malformed UDP packets. A remote attacker could exploit the vulnerability by sending a continuous flow of specially crafted UDP packets to a closed port on the target system to trigger an integer overflow and execute arbitrary code on the target system with kernel level privileges.
Solution
Apply appropriate patches as mentioned in Microsoft Security Bulletin
MS11-083
Vendor Information
Microsoft
http://technet.microsoft.com/en-us/security/bulletin/ms11-083
References
SecurityTracker
http://www.securitytracker.com/id/1026290
Cisco
http://tools.cisco.com/security/center/viewAlert.x?alertId=24490
CVE Name
CVE-2011-2013
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|