Vulnerabilities > CVE-2007-0066 - Unspecified vulnerability in Microsoft products
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
COMPLETE Summary
The kernel in Microsoft Windows 2000 SP4, XP SP2, and Server 2003, when ICMP Router Discovery Protocol (RDP) is enabled, allows remote attackers to cause a denial of service via fragmented router advertisement ICMP packets that trigger an out-of-bounds read, aka "Windows Kernel TCP/IP/ICMP Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 9 | |
Application | 2 |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS08-001.NASL |
description | The remote version of Windows contains a version of the TCP/IP protocol that does not properly parse IGMPv3, MLDv2 and ICMP structure. An attacker may exploit these flaws to execute code on the remote host. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 29893 |
published | 2008-01-08 |
reporter | This script is Copyright (C) 2008-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/29893 |
title | MS08-001: Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution (941644) |
code |
|
Oval
accepted | 2011-11-14T04:00:23.836-05:00 | ||||||||||||||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||||||||||||||
description | The kernel in Microsoft Windows 2000 SP4, XP SP2, and Server 2003, when ICMP Router Discovery Protocol (RDP) is enabled, allows remote attackers to cause a denial of service via fragmented router advertisement ICMP packets that trigger an out-of-bounds read, aka "Windows Kernel TCP/IP/ICMP Vulnerability." | ||||||||||||||||||||||||||||||||||||||||
family | windows | ||||||||||||||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:5271 | ||||||||||||||||||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||||||||||||||||||
submitted | 2008-01-08T14:23:12 | ||||||||||||||||||||||||||||||||||||||||
title | Windows Kernel TCP/IP/ICMP Vulnerability | ||||||||||||||||||||||||||||||||||||||||
version | 44 |
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 27139 CVE(CAN) ID: CVE-2007-0066 Microsoft Windows是微软发布的非常流行的操作系统。 Windows内核的TCP/IP实现(tcpip.sys)中处理碎片路由器广播ICMP查询的方式实现上存在漏洞,远程攻击者可能利用此漏洞导致系统崩溃。 匿名攻击者可以通过在网络上向计算机特制的ICMP报文利用此漏洞,导致计算机停止响应和自动重新启动。但利用此漏洞所必须的ICMP路由发现协议(RDP)不是默认启用的。 Microsoft Windows XP SP2 Microsoft Windows Server 2003 SP2 Microsoft Windows Server 2003 SP1 Microsoft Windows 2000SP4 临时解决方法: * 禁止处理路由器发现协议 1. 单击“开始”,单击“运行”,键入regedit,然后单击“确定”。 2. 展开 HKEY_LOCAL_MACHINE。 3. 依次展开SYSTEM、CurrentControlSet和Services。 4. 依次展开TCPIP、Parameters和Interfaces。 5. 选择interface_name并将PerformRouterDiscovery值设置为0。 注意:您必须重新启动系统以使更改生效。 厂商补丁: Microsoft --------- Microsoft已经为此发布了一个安全公告(MS08-001)以及相应补丁: MS08-001:Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution (941644) 链接:<a href=http://www.microsoft.com/technet/security/bulletin/ms08-001.mspx?pf=true target=_blank>http://www.microsoft.com/technet/security/bulletin/ms08-001.mspx?pf=true</a> |
id | SSV:2796 |
last seen | 2017-11-19 |
modified | 2008-01-10 |
published | 2008-01-10 |
reporter | Root |
title | Microsoft Windows TCP/IP实现ICMP请求远程拒绝服务漏洞(MS08-001) |
References
- http://secunia.com/advisories/28297
- http://www.us-cert.gov/cas/techalerts/TA08-008A.html
- http://www.iss.net/threats/282.html
- http://blogs.technet.com/swi/archive/2008/01/08/ms08-001-part-2-the-case-of-the-moderate-icmp-mitigations.aspx
- http://www.securityfocus.com/bid/27139
- http://securitytracker.com/id?1019166
- http://www.vupen.com/english/advisories/2008/0069
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39254
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5271
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-001
- http://www.securityfocus.com/archive/1/486317/100/0/threaded