Computer Security
[EN] securityvulns.ru no-pyccku


Windows ICMP DoS (potential code execution)
updated since 09.02.2006
Published:14.06.2006
Source:
SecurityVulns ID:5753
Type:remote
Threat Level:
9/10
Description:Buffer overflow on ICMP packets with Loose Source and Record Route IP options. Short message translation: There are DoS conditions in Windows 2000 built-in NAT server. Tested configuration: Windows 2000 English Standard/Advanced Service Pack 4 + Update Rollup 1 for Service Pack 4 with NAT server enabled. While routing packets with options "Loose Source and Record Route" defined by RFC 791 through server, Windows crashes to BSOD with error in tcpip.sys or ntoskrnl.exe, or system hangs or system began instable work. It doesn't metter if packets are from internal or external networks. Use attached script to test vulnerability. On Windows 2003 problem doesn't present. It's also likely same problem to present in Windows 2000 + ISA 2000. Code execution is potentially possible.
Affected:MICROSOFT : Windows 2000 Server
 MICROSOFT : Windows 2000 Professional
 MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
Original documentdocumentМинаев Андрей, Server crash on ICMP packets with Loose Source and Record Route IP options. (14.06.2006)
 documentMICROSOFT, Microsoft Security Bulletin MS06-032 Vulnerability in TCP/IP Could Allow Remote Code Execution (917953) (14.06.2006)
 documentМинаев Андрей, DOS во встроенном NAT сервере Windows 2000 (09.02.2006)
Files:Windows 2000 NAT ICMP options DoS PoC
 Windows 2000 NAT ICMP options DoS PoC
 Microsoft Security Bulletin MS06-032 Vulnerability in TCP/IP Could Allow Remote Code Execution (917953)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod