SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Microsoft)  >   Windows TCP/IP Stack Vendors:   Microsoft
(Microsoft Issues a Fix) Various TCP Stack Implementations Let Remote Users Deny Service
SecurityTracker Alert ID:  1022850
SecurityTracker URL:  http://securitytracker.com/id/1022850
CVE Reference:   CVE-2008-4609   (Links to External Site)
Updated:  Sep 8 2009
Original Entry Date:  Sep 8 2009
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2000 SP4, 2003 SP2, XP SP3, Vista SP2, 2008 SP2; and prior service packs
Description:   Several vulnerabilities were reported in various TCP stack implementations. A remote user can cause denial of service conditions. Multiple vendors and products are affected. Microsoft Windows is affected.

A remote user can send specially crafted data to cause denial of service conditions on the target TCP connection queue.

Published reports indicate that a TCP connection must be established with the target system to exploit these vulnerabilities and that the vulnerabilities are based on weaknesses in the TCP protocol.

Robert E. Lee and Jack Louis of Outpost24 reported these vulnerabilities.

The vulnerabilities were publicly referenced in August 2008 in a blog posting:

http://blog.robertlee.name/2008/08/updates.html

CERT-FI is coordinating with affected vendors.

The CERT-FI advisory is available at:

https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html

[Editor's note: This Alert is a placeholder to document the overall vendor community investigation of these vulnerabilities. As vendors and researchers confirm which specific products are affected, separate Alerts will be issued for each affected product.]

Impact:   A remote user can cause denial of service conditions.
Solution:   Microsoft has issued the following fixes:

Windows Server 2003 Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=48d82036-2fde-4bb0-a60e-92eed83ddc3f

Windows Server 2003 x64 Edition Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=e0298ddf-026e-4137-8197-ed9d9b889825

Windows Server 2003 with SP2 for Itanium-based Systems:

http://www.microsoft.com/downloads/details.aspx?familyid=c948c4d8-5788-4c1a-9fb6-a969b06a888d

Windows Vista, Windows Vista Service Pack 1, and Windows Vista Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=7d72f845-9feb-4685-a669-f9d6ab54f9ed

Windows Vista x64 Edition, Windows Vista x64 Edition Service Pack 1, and Windows Vista x64 Edition Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=b2930ff1-5f0a-4a5d-bf2a-9fb76dd8da63

Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=35c1d5a9-a953-4fc6-90c0-d2358c7b89e6

Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=6e46822e-f79d-492d-ad01-ee680ad324f5

Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=2ac76ee2-b1b6-4300-9cba-af33d9dd54eb

A restart is required.

The Microsoft advisory is available at:

http://www.microsoft.com/technet/security/bulletin/ms09-048.mspx

Vendor URL:  www.microsoft.com/technet/security/Bulletin/MS09-048.mspx (Links to External Site)
Cause:   State error

Message History:   This archive entry is a follow-up to the message listed below.
Oct 17 2008 Various TCP Stack Implementations Let Remote Users Deny Service



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC