Check Point Advisories

Update Protection against Microsoft Windows ICMPv6 Router Advertisement Vulnerability (MS10-009)

Check Point Reference: CPAI-2010-105
Date Published: 17 Feb 2010
Severity: Critical
Last Updated: Friday 01 January, 2010
Source: Microsoft Security Bulletin MS10-009
Industry Reference:CVE-2010-0239
Protection Provided by:
Who is Vulnerable? Windows Vista
Windows Vista Service Pack 1
Windows Vista Service Pack 2
Windows Vista x64 Edition
Windows Vista x64 Edition Service Pack 1
Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems
Windows Server 2008 for Itanium-based Systems Service Pack 2
Vulnerability Description A remote code execution vulnerability exists in the Windows TCP/IP stack due to insufficient bounds checking when processing specially crafted ICMPv6 Router Advertisement packets. An anonymous attacker could exploit the vulnerability by sending specially crafted ICMPv6 Router Advertisement packets to a computer with IPv6 enabled. An attacker could try to exploit the vulnerability by creating specially crafted ICMPv6 packets and sending the packets to a system with IPv6 enabled.  An attacker who successfully exploited this vulnerability could take complete control of an affected system.
Update/Patch AvaliableMicrosoft has released a patch:
http://www.microsoft.com/technet/security/Bulletin/MS10-009.mspx 
Vulnerability DetailsThe vulnerability is caused by the Windows TCP/IP stack not performing the appropriate level of bounds checking on specially crafted ICMPv6 Router Advertisement packets. Router Advertisements allow routers to instruct hosts how to perform Address Autoconfiguration. Router Advertisements contain prefixes that are used for determining whether another address shares the same link and/or address configuration, a suggested hop limit value, etc. Successful exploitation could grant an attacker complete control of the affected system.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK