Vulnerability Name: | CVE-2007-0069 (CCN-35059) | ||||||||
Assigned: | 2007-01-04 | ||||||||
Published: | 2008-01-08 | ||||||||
Updated: | 2018-10-16 | ||||||||
Summary: | Unspecified vulnerability in the kernel in Microsoft Windows XP SP2, Server 2003, and Vista allows remote attackers to cause a denial of service (CPU consumption) and possibly execute arbitrary code via crafted (1) IGMPv3 and (2) MLDv2 packets that trigger memory corruption, aka "Windows Kernel TCP/IP/IGMPv3 and MLDv2 Vulnerability." | ||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
7.4 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MISC Type: UNKNOWN http://blogs.technet.com/swi/archive/2008/01/08/ms08-001-part-3-the-case-of-the-igmp-network-critical.aspx Source: MITRE Type: CNA CVE-2007-0069 Source: SECUNIA Type: Patch, Vendor Advisory 28297 Source: SECTRACK Type: UNKNOWN 1019166 Source: CCN Type: Nortel BULLETIN ID: 2008008560 Centrex IP Client Manager (CICM) response to Microsoft January security bulletin Source: ISS Type: UNKNOWN 20070108 Multiple (3) Microsoft Windows TCP/IP Remote Code Execution and DoS Vulnerabilities Source: CERT-VN Type: US Government Resource VU#115083 Source: CCN Type: Microsoft Security Bulletin MS08-001 Vulnerabilities in TCP/IP Could Allow Remote Code Execution (941644) Source: CCN Type: Microsoft Security Bulletin MS08-004 Vulnerability in Windows TCP/IP Could Allow Denial of Service (946456) Source: HP Type: UNKNOWN SSRT080003 Source: BID Type: UNKNOWN 27100 Source: CERT Type: US Government Resource TA08-008A Source: VUPEN Type: Vendor Advisory ADV-2008-0069 Source: MS Type: UNKNOWN MS08-001 Source: XF Type: UNKNOWN ssm-list-bo(35059) Source: CCN Type: IBM Internet Security Systems X-Force Database Microsoft Windows TCP/IP Source Specific Multicasting (SSM) IGMPv3 buffer overflow Source: XF Type: UNKNOWN win-ssm-igmp-bo(39452) Source: XF Type: UNKNOWN win-ssm-mld-bo(39453) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:5370 | ||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
Vulnerability Name: | CVE-2007-0069 (CCN-39452) | ||||||||
Assigned: | 2007-01-04 | ||||||||
Published: | 2008-01-08 | ||||||||
Updated: | 2008-01-08 | ||||||||
Summary: | The Microsoft Windows TCP/IP implementation is vulnerable to multiple buffer overflows in the Source Specific Multicasting (SSM) timers caused by improper handling of IGMPv3 packets. By sending a series of malformed IGMPv3 packets to a vulnerable host, a remote attacker could overflow a buffer and execute arbitrary code on the system. | ||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
7.4 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2007-0069 Source: CCN Type: SA28297 Microsoft Windows TCP/IP Implementation Vulnerabilities Source: CCN Type: SECTRACK ID: 1019166 Windows TCP/IP Stack ICMP and IGMP Bugs Let Remote Users Deny Service and Execute Arbitrary Code Source: CCN Type: ASA-2008-019 MS08-001 Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution (941644) Source: CCN Type: Nortel BULLETIN ID: 2008008560 Centrex IP Client Manager (CICM) response to Microsoft January security bulletin Source: CCN Type: IBM Internet Security Systems Protection Advisory, Jan. 8, 2008 Multiple (3) Microsoft Windows TCP/IP Remote Code Execution and DoS Vulnerabilities Source: CCN Type: US-CERT VU#115083 Microsoft Windows IGMPv3 and MLDv2 processing vulnerability Source: CCN Type: Microsoft Security Bulletin MS08-001 Vulnerabilities in TCP/IP Could Allow Remote Code Execution (941644) Source: CCN Type: Microsoft Security Bulletin MS08-004 Vulnerability in Windows TCP/IP Could Allow Denial of Service (946456) Source: CCN Type: BID-27100 Microsoft Windows TCP/IP IGMP MLD Remote Buffer Overflow Vulnerability Source: XF Type: UNKNOWN win-ssm-igmp-bo(39452) | ||||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||||
Vulnerability Name: | CVE-2007-0069 (CCN-39453) | ||||||||
Assigned: | 2007-01-04 | ||||||||
Published: | 2008-01-08 | ||||||||
Updated: | 2008-01-08 | ||||||||
Summary: | The Microsoft Windows TCP/IP implementation is vulnerable to multiple buffer overflows in the Source Specific Multicasting (SSM) timers caused by improper handling of MLDv2 packets. By sending a series of malformed MLDv2 packets to a vulnerable host, a remote attacker could overflow a buffer and execute arbitrary code on the system. | ||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
7.4 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2007-0069 Source: CCN Type: SA28297 Microsoft Windows TCP/IP Implementation Vulnerabilities Source: CCN Type: SECTRACK ID: 1019166 Windows TCP/IP Stack ICMP and IGMP Bugs Let Remote Users Deny Service and Execute Arbitrary Code Source: CCN Type: ASA-2008-019 MS08-001 Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution (941644) Source: CCN Type: Nortel BULLETIN ID: 2008008560 Centrex IP Client Manager (CICM) response to Microsoft January security bulletin Source: CCN Type: IBM Internet Security Systems Protection Advisory, Jan. 8, 2008 Multiple (3) Microsoft Windows TCP/IP Remote Code Execution and DoS Vulnerabilities Source: CCN Type: US-CERT VU#115083 Microsoft Windows IGMPv3 and MLDv2 processing vulnerability Source: CCN Type: Microsoft Security Bulletin MS08-001 Vulnerabilities in TCP/IP Could Allow Remote Code Execution (941644) Source: CCN Type: Microsoft Security Bulletin MS08-004 Vulnerability in Windows TCP/IP Could Allow Denial of Service (946456) Source: CCN Type: BID-27100 Microsoft Windows TCP/IP IGMP MLD Remote Buffer Overflow Vulnerability Source: XF Type: UNKNOWN win-ssm-mld-bo(39453) | ||||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |