Microsoft Windows Internet Protocol Validation Remote Code Execution Vulnerability
BID:13116
Info
Microsoft Windows Internet Protocol Validation Remote Code Execution Vulnerability
| Bugtraq ID: | 13116 |
| Class: | Failure to Handle Exceptional Conditions |
| CVE: |
CVE-2005-0048 |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 12 2005 12:00AM |
| Updated: | Jul 12 2009 12:56PM |
| Credit: | Discovery of this vulnerability is credited to Song Liu, Hongzhen Zhou, and Neel Mehta of ISS X-Force. |
| Vulnerable: |
Microsoft Windows XP Tablet PC Edition SP1 Microsoft Windows XP Tablet PC Edition Microsoft Windows XP Professional SP1 Microsoft Windows XP Professional Microsoft Windows XP Media Center Edition SP1 Microsoft Windows XP Media Center Edition Microsoft Windows XP Home SP1 Microsoft Windows XP Home Microsoft Windows XP Embedded SP1 Microsoft Windows XP Embedded Microsoft Windows XP 64-bit Edition Version 2003 SP1 Microsoft Windows XP 64-bit Edition Version 2003 Microsoft Windows XP 64-bit Edition SP1 Microsoft Windows XP 64-bit Edition Microsoft Windows 2000 Server SP4 Microsoft Windows 2000 Server SP3 Microsoft Windows 2000 Server SP2 Microsoft Windows 2000 Server SP1 Microsoft Windows 2000 Server Microsoft Windows 2000 Professional SP4 Microsoft Windows 2000 Professional SP3 Microsoft Windows 2000 Professional SP2 Microsoft Windows 2000 Professional SP1 Microsoft Windows 2000 Professional Microsoft Windows 2000 Datacenter Server SP4 Microsoft Windows 2000 Datacenter Server SP3 Microsoft Windows 2000 Datacenter Server SP2 Microsoft Windows 2000 Datacenter Server SP1 Microsoft Windows 2000 Datacenter Server Microsoft Windows 2000 Advanced Server SP4 Microsoft Windows 2000 Advanced Server SP3 Microsoft Windows 2000 Advanced Server SP2 Microsoft Windows 2000 Advanced Server SP1 Microsoft Windows 2000 Advanced Server |
| Not Vulnerable: |
Microsoft Windows XP Tablet PC Edition SP2 Microsoft Windows XP Professional SP2 Microsoft Windows XP Media Center Edition SP2 Microsoft Windows XP Home SP2 Microsoft Windows Server 2003 Web Edition SP1 Microsoft Windows Server 2003 Web Edition Microsoft Windows Server 2003 Standard Edition SP1 Microsoft Windows Server 2003 Standard Edition Microsoft Windows Server 2003 Enterprise Edition Itanium SP1 Microsoft Windows Server 2003 Enterprise Edition Itanium 0 Microsoft Windows Server 2003 Enterprise Edition SP1 Microsoft Windows Server 2003 Enterprise Edition Microsoft Windows Server 2003 Datacenter Edition Itanium SP1 Microsoft Windows Server 2003 Datacenter Edition Itanium 0 Microsoft Windows Server 2003 Datacenter Edition SP1 Microsoft Windows Server 2003 Datacenter Edition |
Discussion
Microsoft Windows Internet Protocol Validation Remote Code Execution Vulnerability
Microsoft Windows is reported prone to a remote code execution vulnerability. It is reported that the vulnerability manifests when an affected Microsoft platform receives and processes an especially malformed TCP/IP packet.
Reports indicate that the immediate consequences of exploitation of this issue are a denial of service.
Microsoft Windows is reported prone to a remote code execution vulnerability. It is reported that the vulnerability manifests when an affected Microsoft platform receives and processes an especially malformed TCP/IP packet.
Reports indicate that the immediate consequences of exploitation of this issue are a denial of service.
Exploit / POC
Microsoft Windows Internet Protocol Validation Remote Code Execution Vulnerability
The following proof of concepts have been made available; the first is designed to cause the affected computer to restart:
The following proof of concepts have been made available; the first is designed to cause the affected computer to restart:
Solution / Fix
Microsoft Windows Internet Protocol Validation Remote Code Execution Vulnerability
Solution:
Microsoft has released an advisory and updates to address this issue for supported platforms.
Microsoft has released revised fixes to address this and other issues. Microsoft recommends installing the revised fixes even if the previous versions have been installed.
Microsoft Windows XP 64-bit Edition SP1
Microsoft Windows 2000 Advanced Server SP4
Microsoft Windows 2000 Professional SP3
Microsoft Windows 2000 Datacenter Server SP4
Microsoft Windows XP Home
Microsoft Windows 2000 Advanced Server SP3
Microsoft Windows XP Home SP1
Microsoft Windows 2000 Datacenter Server SP3
Microsoft Windows 2000 Server SP3
Microsoft Windows XP 64-bit Edition
Microsoft Windows 2000 Server SP4
Microsoft Windows XP Professional
Microsoft Windows 2000 Professional SP4
Microsoft Windows XP Professional SP1
Solution:
Microsoft has released an advisory and updates to address this issue for supported platforms.
Microsoft has released revised fixes to address this and other issues. Microsoft recommends installing the revised fixes even if the previous versions have been installed.
Microsoft Windows XP 64-bit Edition SP1
-
Microsoft Security Update for Windows XP 64-bit Edition (KB893066)
http://www.microsoft.com/downloads/details.aspx?familyid=98D7C0DA-EA4D -4095-9047-C0086D0D29A8&displaylang=en
Microsoft Windows 2000 Advanced Server SP4
-
Microsoft Security Update for Windows 2000 (KB893066)
http://www.microsoft.com/downloads/details.aspx?familyid=FCDF84FF-AE44 -4EB1-A58C-12D5D122FC95&displaylang=en
Microsoft Windows 2000 Professional SP3
-
Microsoft Security Update for Windows 2000 (KB893066)
http://www.microsoft.com/downloads/details.aspx?familyid=FCDF84FF-AE44 -4EB1-A58C-12D5D122FC95&displaylang=en
Microsoft Windows 2000 Datacenter Server SP4
-
Microsoft Security Update for Windows 2000 (KB893066)
http://www.microsoft.com/downloads/details.aspx?familyid=FCDF84FF-AE44 -4EB1-A58C-12D5D122FC95&displaylang=en
Microsoft Windows XP Home
-
Microsoft Security Update for Windows XP (KB893066)
http://www.microsoft.com/downloads/details.aspx?familyid=81049A86-6F39 -4A27-A643-391262785CF3&displaylang=en
Microsoft Windows 2000 Advanced Server SP3
-
Microsoft Security Update for Windows 2000 (KB893066)
http://www.microsoft.com/downloads/details.aspx?familyid=FCDF84FF-AE44 -4EB1-A58C-12D5D122FC95&displaylang=en
Microsoft Windows XP Home SP1
-
Microsoft Security Update for Windows XP (KB893066)
http://www.microsoft.com/downloads/details.aspx?familyid=81049A86-6F39 -4A27-A643-391262785CF3&displaylang=en
Microsoft Windows 2000 Datacenter Server SP3
-
Microsoft Security Update for Windows 2000 (KB893066)
http://www.microsoft.com/downloads/details.aspx?familyid=FCDF84FF-AE44 -4EB1-A58C-12D5D122FC95&displaylang=en
Microsoft Windows 2000 Server SP3
-
Microsoft Security Update for Windows 2000 (KB893066)
http://www.microsoft.com/downloads/details.aspx?familyid=FCDF84FF-AE44 -4EB1-A58C-12D5D122FC95&displaylang=en
Microsoft Windows XP 64-bit Edition
-
Microsoft Security Update for Windows XP 64-bit Edition (KB893066)
http://www.microsoft.com/downloads/details.aspx?familyid=98D7C0DA-EA4D -4095-9047-C0086D0D29A8&displaylang=en
Microsoft Windows 2000 Server SP4
-
Microsoft Security Update for Windows 2000 (KB893066)
http://www.microsoft.com/downloads/details.aspx?familyid=FCDF84FF-AE44 -4EB1-A58C-12D5D122FC95&displaylang=en
Microsoft Windows XP Professional
-
Microsoft Security Update for Windows XP (KB893066)
http://www.microsoft.com/downloads/details.aspx?familyid=81049A86-6F39 -4A27-A643-391262785CF3&displaylang=en
Microsoft Windows 2000 Professional SP4
-
Microsoft Security Update for Windows 2000 (KB893066)
http://www.microsoft.com/downloads/details.aspx?familyid=FCDF84FF-AE44 -4EB1-A58C-12D5D122FC95&displaylang=en
Microsoft Windows XP Professional SP1
-
Microsoft Security Update for Windows XP (KB893066)
http://www.microsoft.com/downloads/details.aspx?familyid=81049A86-6F39 -4A27-A643-391262785CF3&displaylang=en
References
Microsoft Windows Internet Protocol Validation Remote Code Execution Vulnerability
References:
References:
- Microsoft Security Bulletin MS05-019 (Microsoft)
- Windows IP Options Remote Compromise (ISS)