Tuesday, January 08, 2008

Wow exploitable MSFT TCP/IP Vulns! Is it 1998 or 2008?

While I'd expect this kind of shit from Cisco (don't ask me what that even means and it definitely has nothing to do with anyone from Finland or the fact I've drinking horribly strong Nordic beer lately) but I was shocked to see MS08-001. Very cool. Maybe I do remember looking at IGMPv3 back in the day and thinking what a mess, so maybe this isn't such a suprise. Nonetheless, seems very old school and maybe there is some attack surface below HTTP.
A denial of service vulnerability exists in TCP/IP due to the way that Windows Kernel processes fragmented router advertisement ICMP queries. ICMP Router Discovery Protocol (RDP) is not enabled by default and is required in order to exploit this vulnerability. However, on Windows 2003 Server and on Windows XP, RDP can be turned on by a setting in DHCP or by a setting in the registry. On Windows 2000, RDP can be turned on by a setting in the registry. An anonymous attacker could exploit the vulnerability by sending specially crafted ICMP packets to a computer over the network. An attacker who successfully exploited this vulnerability could cause the computer to stop responding and automatically restart.
and
A remote code execution vulnerability exists in the Windows kernel due to the way that the Windows kernel handles TCP/IP structures storing the state of IGMPv3 and MLDv2 queries. Supported editions of Microsoft Windows XP, Windows Server 2003, and Windows Vista all support IGMPv3. In addition to IGMPv3, Windows Vista supports MDLv2, which adds multicast support for IPv6 networks. An anonymous attacker could exploit the vulnerability by sending specially crafted IGMPv3 and MLDv2 packets to a computer over the network. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

No comments: