Vulnerability Name:

CVE-2007-0069 (CCN-35059)

Assigned:2007-01-04
Published:2008-01-08
Updated:2018-10-16
Summary:Unspecified vulnerability in the kernel in Microsoft Windows XP SP2, Server 2003, and Vista allows remote attackers to cause a denial of service (CPU consumption) and possibly execute arbitrary code via crafted (1) IGMPv3 and (2) MLDv2 packets that trigger memory corruption, aka "Windows Kernel TCP/IP/IGMPv3 and MLDv2 Vulnerability."
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Authentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Athentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MISC
Type: UNKNOWN
http://blogs.technet.com/swi/archive/2008/01/08/ms08-001-part-3-the-case-of-the-igmp-network-critical.aspx

Source: MITRE
Type: CNA
CVE-2007-0069

Source: SECUNIA
Type: Patch, Vendor Advisory
28297

Source: SECTRACK
Type: UNKNOWN
1019166

Source: CCN
Type: Nortel BULLETIN ID: 2008008560
Centrex IP Client Manager (CICM) response to Microsoft January security bulletin

Source: ISS
Type: UNKNOWN
20070108 Multiple (3) Microsoft Windows TCP/IP Remote Code Execution and DoS Vulnerabilities

Source: CERT-VN
Type: US Government Resource
VU#115083

Source: CCN
Type: Microsoft Security Bulletin MS08-001
Vulnerabilities in TCP/IP Could Allow Remote Code Execution (941644)

Source: CCN
Type: Microsoft Security Bulletin MS08-004
Vulnerability in Windows TCP/IP Could Allow Denial of Service (946456)

Source: HP
Type: UNKNOWN
SSRT080003

Source: BID
Type: UNKNOWN
27100

Source: CERT
Type: US Government Resource
TA08-008A

Source: VUPEN
Type: Vendor Advisory
ADV-2008-0069

Source: MS
Type: UNKNOWN
MS08-001

Source: XF
Type: UNKNOWN
ssm-list-bo(35059)

Source: CCN
Type: IBM Internet Security Systems X-Force Database
Microsoft Windows TCP/IP Source Specific Multicasting (SSM) IGMPv3 buffer overflow

Source: XF
Type: UNKNOWN
win-ssm-igmp-bo(39452)

Source: XF
Type: UNKNOWN
win-ssm-mld-bo(39453)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:5370

Vulnerable Configuration:Configuration 1:
  • cpe:/o:microsoft:windows_2003_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2007-0069 (CCN-39452)

    Assigned:2007-01-04
    Published:2008-01-08
    Updated:2008-01-08
    Summary:The Microsoft Windows TCP/IP implementation is vulnerable to multiple buffer overflows in the Source Specific Multicasting (SSM) timers caused by improper handling of IGMPv3 packets. By sending a series of malformed IGMPv3 packets to a vulnerable host, a remote attacker could overflow a buffer and execute arbitrary code on the system.
    CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Changed
    Impact Metrics:Confidentiality (C): High
    Integrity (I): High
    Availibility (A): High
    CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
    6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
    7.4 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Consequences:Gain Access
    References:Source: MITRE
    Type: CNA
    CVE-2007-0069

    Source: CCN
    Type: SA28297
    Microsoft Windows TCP/IP Implementation Vulnerabilities

    Source: CCN
    Type: SECTRACK ID: 1019166
    Windows TCP/IP Stack ICMP and IGMP Bugs Let Remote Users Deny Service and Execute Arbitrary Code

    Source: CCN
    Type: ASA-2008-019
    MS08-001 Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution (941644)

    Source: CCN
    Type: Nortel BULLETIN ID: 2008008560
    Centrex IP Client Manager (CICM) response to Microsoft January security bulletin

    Source: CCN
    Type: IBM Internet Security Systems Protection Advisory, Jan. 8, 2008
    Multiple (3) Microsoft Windows TCP/IP Remote Code Execution and DoS Vulnerabilities

    Source: CCN
    Type: US-CERT VU#115083
    Microsoft Windows IGMPv3 and MLDv2 processing vulnerability

    Source: CCN
    Type: Microsoft Security Bulletin MS08-001
    Vulnerabilities in TCP/IP Could Allow Remote Code Execution (941644)

    Source: CCN
    Type: Microsoft Security Bulletin MS08-004
    Vulnerability in Windows TCP/IP Could Allow Denial of Service (946456)

    Source: CCN
    Type: BID-27100
    Microsoft Windows TCP/IP IGMP MLD Remote Buffer Overflow Vulnerability

    Source: XF
    Type: UNKNOWN
    win-ssm-igmp-bo(39452)

    Vulnerable Configuration:Configuration CCN 1:
  • cpe:/o:microsoft:windows:2003_server:*:x64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:xp:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:2003_server:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:2003_server:sp1_itanium:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:server_2003:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:server_2003:sp2:itanium:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:server_2003:sp2:x64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp::sp2:x64:*:professional:*:*:*
  • OR cpe:/a:microsoft:small_business_server:2003:*:sp1:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2007-0069 (CCN-39453)

    Assigned:2007-01-04
    Published:2008-01-08
    Updated:2008-01-08
    Summary:The Microsoft Windows TCP/IP implementation is vulnerable to multiple buffer overflows in the Source Specific Multicasting (SSM) timers caused by improper handling of MLDv2 packets. By sending a series of malformed MLDv2 packets to a vulnerable host, a remote attacker could overflow a buffer and execute arbitrary code on the system.
    CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Changed
    Impact Metrics:Confidentiality (C): High
    Integrity (I): High
    Availibility (A): High
    CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
    6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
    7.4 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Consequences:Gain Access
    References:Source: MITRE
    Type: CNA
    CVE-2007-0069

    Source: CCN
    Type: SA28297
    Microsoft Windows TCP/IP Implementation Vulnerabilities

    Source: CCN
    Type: SECTRACK ID: 1019166
    Windows TCP/IP Stack ICMP and IGMP Bugs Let Remote Users Deny Service and Execute Arbitrary Code

    Source: CCN
    Type: ASA-2008-019
    MS08-001 Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution (941644)

    Source: CCN
    Type: Nortel BULLETIN ID: 2008008560
    Centrex IP Client Manager (CICM) response to Microsoft January security bulletin

    Source: CCN
    Type: IBM Internet Security Systems Protection Advisory, Jan. 8, 2008
    Multiple (3) Microsoft Windows TCP/IP Remote Code Execution and DoS Vulnerabilities

    Source: CCN
    Type: US-CERT VU#115083
    Microsoft Windows IGMPv3 and MLDv2 processing vulnerability

    Source: CCN
    Type: Microsoft Security Bulletin MS08-001
    Vulnerabilities in TCP/IP Could Allow Remote Code Execution (941644)

    Source: CCN
    Type: Microsoft Security Bulletin MS08-004
    Vulnerability in Windows TCP/IP Could Allow Denial of Service (946456)

    Source: CCN
    Type: BID-27100
    Microsoft Windows TCP/IP IGMP MLD Remote Buffer Overflow Vulnerability

    Source: XF
    Type: UNKNOWN
    win-ssm-mld-bo(39453)

    Vulnerable Configuration:Configuration CCN 1:
  • cpe:/o:microsoft:windows_vista:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:*:*:*:*:*:*:x64:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:5370
    V
    Windows Kernel TCP/IP/IGMPv3 and MLDv2 Vulnerability
    2011-11-14
    BACK
    microsoft windows 2003 server *
    microsoft windows vista *
    microsoft windows xp * sp2
    microsoft windows 2003_server
    microsoft windows xp sp2
    microsoft windows 2003_server sp1
    microsoft windows 2003_server sp1_itanium
    microsoft windows server_2003 sp2
    microsoft windows server_2003 sp2
    microsoft windows server_2003 sp2
    microsoft windows xp sp2
    microsoft small business server 2003
    microsoft windows vista *
    microsoft windows vista *