MS10-009: Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution (974145)

This script is Copyright (C) 2010-2013 Tenable Network Security, Inc.


Synopsis :

The remote host has multiple vulnerabilities in its TCP/IP
implementation.

Description :

The remote Windows host has the following vulnerabilities in its
TCP/IP implementation :

- Hosts with IPv6 enabled perform insufficient bounds
checking when processing specially crafted ICMPv6 Router
Advertisement packets. A remote attacker could exploit
this to execute arbitrary code. (CVE-2010-0239)

- Specially crafted Encapsulating Security Payloads (ESP)
are not processed properly. A remote attacker could
exploit this to execute arbitrary code. (CVE-2010-0240)

- Hosts with IPv6 enabled perform insufficient bounds
checking when processing specially crafted ICMPv6 Route
Information packets. A remote attacker could exploit
this to execute arbitrary code. (CVE-2010-0241)

- Specially crafted TCP packets with a malformed
selective acknowledgment (SACK) value can cause the
system to stop responding and automatically restart. A
remote attacker could exploit this to cause a denial of
service. (CVE-2009-0242)

See also :

http://technet.microsoft.com/en-us/security/bulletin/MS10-009

Solution :

Microsoft has released a set of patches for Windows Vista and 2008.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.8
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 44419 ()

Bugtraq ID: 38061
38062
38063
38064

CVE ID: CVE-2010-0239
CVE-2010-0240
CVE-2010-0241
CVE-2010-0242