MS11-083: Vulnerability in TCP/IP Could Allow Remote Code Execution (2588516)

This script is Copyright (C) 2011-2013 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has a code execution vulnerability.

Description :

The TCP/IP stack in use on the remote Windows host is affected by an
integer overflow vulnerability. Sending a continuous flow of specially
crafted UDP packets to a closed port can result in arbitrary code
execution in kernel mode.

See also :

http://www.nessus.org/u?5e5115ff
http://technet.microsoft.com/en-us/security/bulletin/ms11-083

Solution :

Microsoft has released a set of patches for Windows Vista, 2008, 7,
and 2008 R2.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.8
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 56736 ()

Bugtraq ID: 50517

CVE ID: CVE-2011-2013