ISS Protection Brief: Windows IP Options Remote Compromise

2005-04-13T00:00:00
ID SECURITYVULNS:DOC:8311
Type securityvulns
Reporter Securityvulns
Modified 2005-04-13T00:00:00

Description

-----BEGIN PGP SIGNED MESSAGE-----

Internet Security Systems Protection Brief April 12, 2005

Windows IP Options Remote Compromise

Summary:

X-force has discovered a vulnerability in Windows NT-based IP Stack drivers. This vulnerability affects most modern Windows operating systems, and could allow for remote compromise of networked systems. This vulnerability is trivially exploitable to cause a denial of service condition, and may be exploited to gain access to affected systems. In most cases, but not in all, exploitation of this issue will be limited to the local subnet.

Business Impact:

Successful exploitation of this vulnerability could be leveraged to gain complete control over target systems, and might lead to malware installation, exposure of confidential information, or further network compromise. Due to the widespread use of the affected operating systems and the critical nature of component affected, it is likely that servers and desktops used for a wide variety of purposes are vulnerable to this issue.

For the complete X-Force Protection Advisory, please visit: http://xforce.iss.net/xforce/alerts/id/192


Internet Security Systems, Inc. (ISS) is the trusted expert to global enterprises and world governments, providing products and services that protect against Internet threats. An established world leader in security since 1994, ISS delivers proven cost efficiencies and reduces regulatory and business risk across the enterprise for more than 11,000 customers worldwide. ISS products and services are based on the proactive security intelligence conducted by ISS. X-Force® research and development team . the unequivocal world authority in vulnerability and threat research. Headquartered in Atlanta, Internet Security Systems has additional operations throughout the Americas, Asia, Australia, Europe and the Middle East.

Copyright (c) 2005 Internet Security Systems, Inc. All rights reserved worldwide.

This document is not to be edited or altered in any way without the express written consent of Internet Security Systems, Inc. If you wish to reprint the whole or any part of this document, please email xforceiss.net for permission. You may provide links to this document from your web site, and you may make copies of this document in accordance with the fair use doctrine of the U.S. copyright laws.

Disclaimer: The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

X-Force PGP Key available on MIT's PGP key server and PGP.com's key server, as well as at http://www.iss.net/security_center/sensitive.php Please send suggestions, updates, and comments to: xforceiss.net of Internet Security Systems, Inc.

-----BEGIN PGP SIGNATURE----- Version: 2.6.2

iQCVAwUBQlwP6zRfJiV99eG9AQHIswP9Hn96//1jfJWVpYQVywnRFvsoQ1G29O/i t/kbdcBAGpNICHL329/taWPd4oOkwQh0uhDK/VbpoI864yCoKl7vV+kIrmFV2ptT SJvHXQBhp6JEa5Xl46yY1tynuR1p2sp/ZcyroxM9yr8u4X6RLO6roMuyVot1x7H7 uL8oglDbyTk= =na2R -----END PGP SIGNATURE-----