Wednesday, November 9, 2011

X-FORCE DATABASE UPDATES Microsoft Windows TCP/IP code execution


Microsoft Windows TCP/IP code execution



Description:
Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by an error in the TCP/IP stack when processing UDP packets. By sending specially-crafted UDP packets to a closed port, a remote attacker could exploit this vulnerability to execute arbitrary code on the system with the privileges of the victim.
Platforms Affected:
Microsoft Windows 7 SP1 x64
Microsoft Windows 7 x32
Microsoft Windows Server 2008 R2 x64
Microsoft Windows Server 2008 R2 SP1 x64
Microsoft Windows Server 2008 R2 SP1 Itanium
Microsoft Windows Server 2008 R2 Itanium
Microsoft Windows Server 2008 x64
Microsoft Windows Server 2008 SP2 x32
Microsoft Windows Server 2008 SP2 Itanium
Microsoft Windows Vista SP2 x64
Microsoft Windows Vista SP2

References:
Microsoft Security Bulletin MS11-083: Vulnerability in TCP/IP Could Allow Remote Code Execution (588516).
CVE-2011-2013: ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
SA46731: Microsoft Windows TCP/IP Reference Counter Overflow Vulnerability

for more information click HERE.




No comments:

Post a Comment