SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Microsoft)  >   Windows TCP/IP Stack Vendors:   Microsoft
Windows IPv6 Stack ISATAP Tunnel Validation Flaw Lets Remote Users Spoof IPv4 Addresses
SecurityTracker Alert ID:  1023857
SecurityTracker URL:  http://securitytracker.com/id/1023857
CVE Reference:   CVE-2010-0812   (Links to External Site)
Updated:  Apr 22 2010
Original Entry Date:  Apr 13 2010
Impact:   Host/resource access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): XP SP3, 2003 SP2, Vista SP2, 2008 SP2; and prior service packs
Description:   A vulnerability was reported in the Windows IPv6 Stack. A remote user may be able to spoof an IPv4 address to bypass access control devices.

A remote user can set a specially crafted IPv6 address in a tunneled Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) packet to spoof an IPv4 address and potentially bypass firewall access controls.

Gabi Nakibly of the National EW Research & Simulation Center (at Rafael) reported this vulnerability.

Impact:   A remote user can spoof IPv4 addresses in certain cases.
Solution:   The vendor has issued the following fixes:

Windows XP Service Pack 2 and Windows XP Service Pack 3:

http://www.microsoft.com/downloads/details.aspx?familyid=9DC3E1C2-2E9D-4D86-9FCE-446C409AD613

Windows XP Professional x64 Edition Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=D872BD77-F491-4706-8FF5-081AC0BF3D6F

Windows Server 2003 Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=CD007A6C-04B3-490C-AFF4-D5AF3E69D477

Windows Server 2003 x64 Edition Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=19CFDDFE-E8DA-4564-9730-BABFAE4A3EBB

Windows Server 2003 with SP2 for Itanium-based Systems:

http://www.microsoft.com/downloads/details.aspx?familyid=916F1B09-E79E-4347-9FBC-C0CF07DE397D

Windows Vista, Windows Vista Service Pack 1, and Windows Vista Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=196055A6-15D1-4DA8-B33D-501E69BF5176

Windows Vista x64 Edition, Windows Vista x64 Edition Service Pack 1, and Windows Vista x64 Edition Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=7C1D1622-1B67-438D-AAE4-1A3954974A36

Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=61ECE7BC-E9FA-4EDE-BA7D-9E5A4C64B9BE

Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=72E7C7EA-55EF-457B-A03A-49AA9DEA2E84

Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=8C48302C-A1D6-41BC-AD24-7CE7332D4842

A restart is required.

The Microsoft advisory is available at:

http://www.microsoft.com/technet/security/bulletin/ms10-029.mspx

Vendor URL:  www.microsoft.com/technet/security/bulletin/ms10-029.mspx (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC