Skip to main content

Microsoft Windows TCP/IP Stack Two Vulnerabilities

Last Update Date: 9 May 2012 16:12 Release Date: 9 May 2012 4365 Views

RISK: High Risk

TYPE: Operating Systems - Windows OS

TYPE: Windows OS
  1. Windows Firewall Bypass Vulnerability

    A security feature bypass vulnerability exists in Windows due to the way that Windows Firewall handles outbound broadcast packets. An attacker who successfully exploited this vulnerability could bypass the Windows Firewall defense-in-depth mechanism to facilitate exploitation of other vulnerabilities.

     

  2. TCP/IP Double Free Vulnerability

    An elevation of privilege vulnerability exists in the Windows TCP/IP stack that affects Windows 7 and Windows Server 2008 R2. All editions of Microsoft Windows XP, Windows Server 2003, Windows Vista, and Window Server 2008 are not affected. This vulnerability is caused when the Windows TCP/IP stack fails to properly handle the binding of IPv6 addresses.

     


Impact

  • Elevation of Privilege
  • Security Restriction Bypass

System / Technologies affected

  • Windows Vista
  • Windows7
  • Windows Server 2008
  • Windows Server 2008 R2

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.


Vulnerability Identifier


Source


Related Link