Vulnerabilities > CVE-2008-0084 - Unspecified vulnerability in Microsoft Windows Vista
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN microsoft
nessus
Summary
Unspecified vulnerability in the TCP/IP support in Microsoft Windows Vista allows remote DHCP servers to cause a denial of service (hang and restart) via a crafted DHCP packet.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 1 |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS08-004.NASL |
description | The remote version of Windows contains a version of the TCP/IP protocol that does not properly parse DHCP packets. An attacker may exploit these flaws to crash the remote host. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 31038 |
published | 2008-02-12 |
reporter | This script is Copyright (C) 2008-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/31038 |
title | MS08-004: Vulnerability in Windows TCP/IP Could Allow Denial of Service (946456) |
code |
|
Oval
accepted | 2011-10-31T04:04:07.851-04:00 | ||||||||||||
class | vulnerability | ||||||||||||
contributors |
| ||||||||||||
definition_extensions |
| ||||||||||||
description | Unspecified vulnerability in the TCP/IP support in Microsoft Windows Vista allows remote DHCP servers to cause a denial of service (hang and restart) via a crafted DHCP packet. | ||||||||||||
family | windows | ||||||||||||
id | oval:org.mitre.oval:def:5240 | ||||||||||||
status | accepted | ||||||||||||
submitted | 2008-02-14T10:00:19 | ||||||||||||
title | Windows Kernel TCP/IP Vulnerability | ||||||||||||
version | 43 |
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 27634 CVE(CAN) ID: CVE-2008-0084 Windows Vista是微软发布的最新版本的操作系统。 Windows Vista的TCP/IP栈处理从DHCP服务器接收到报文的方式存在拒绝服务漏洞,攻击者可以创建特制的DHCP服务器,该服务器会向主机返回特制报文,破坏TCP/IP结构,导致受影响系统停止响应并自动重启。 Microsoft Windows Vista 临时解决方法: * 为客户端机器分配静态的IP地址而不是自动请求IP地址: 1. 在客户端机器上,点击“控制面板”,然后点击“网络和共享中心” 2. “本地连接”然后点击“查看状态” 3. 点击“属性” 4. 点击“Internet协议版本4(TCP/IPv4)”然后点击“属性” 5. 选择“使用下面的IP地址”然后输入IP地址、子网掩码、默认网关和首选DNS服 务器 6. 点击“确定” 厂商补丁: Microsoft --------- Microsoft已经为此发布了一个安全公告(MS08-004)以及相应补丁: MS08-004:Vulnerability in Windows TCP/IP Could Allow Denial of Service (946456) 链接:<a href=http://www.microsoft.com/technet/security/Bulletin/MS08-004.mspx?pf=true target=_blank>http://www.microsoft.com/technet/security/Bulletin/MS08-004.mspx?pf=true</a> 补丁下载: <a href=http://www.microsoft.com/downloads/details.aspx?familyid=8ce9608b-7049-47cd-adc4-22a803877d33 target=_blank>http://www.microsoft.com/downloads/details.aspx?familyid=8ce9608b-7049-47cd-adc4-22a803877d33</a> <a href=http://www.microsoft.com/downloads/details.aspx?familyid=d7b9c3d1-9c23-4e05-bac6-d0b327feaf53 target=_blank>http://www.microsoft.com/downloads/details.aspx?familyid=d7b9c3d1-9c23-4e05-bac6-d0b327feaf53</a> |
id | SSV:2907 |
last seen | 2017-11-19 |
modified | 2008-02-20 |
published | 2008-02-20 |
reporter | Root |
title | Microsoft Windows Vista DHCP远程拒绝服务漏洞(MS08-004) |
References
- http://marc.info/?l=bugtraq&m=120361015026386&w=2
- http://marc.info/?l=bugtraq&m=120361015026386&w=2
- http://marc.info/?l=bugtraq&m=120361015026386&w=2
- http://marc.info/?l=bugtraq&m=120361015026386&w=2
- http://secunia.com/advisories/28828
- http://secunia.com/advisories/28828
- http://www.securityfocus.com/bid/27634
- http://www.securityfocus.com/bid/27634
- http://www.securitytracker.com/id?1019383
- http://www.securitytracker.com/id?1019383
- http://www.us-cert.gov/cas/techalerts/TA08-043C.html
- http://www.us-cert.gov/cas/techalerts/TA08-043C.html
- http://www.vupen.com/english/advisories/2008/0506/references
- http://www.vupen.com/english/advisories/2008/0506/references
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-004
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-004
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5240
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5240