{"vuid":"VU#722753","idnumber":"722753","name":"Microsoft IP Source Route Vulnerability","keywords":["Microsoft","arbitrary code execution","IP Source Route","ms06-june","MS06-032"],"overview":"A vulnerability in Microsoft Windows could allow a remote attacker to execute arbitrary code on a vulnerable system.","clean_desc":"Source routing is a technique to determine the network route for a packet based on information supplied by the sender in the IP packet. The TCP/IP driver in some versions of Microsoft Windows contains a buffer overflow in the handling of packets with source routing information. The driver fails to validate the length of a message before it is passed to an allocated buffer. Microsoft states that IP packets containing IP source route options 131 and 137 could be used to initiate a connection with the affected components.","impact":"A remote attacker with the ability to supply a specially crafted packet may be able to execute arbitrary code on an affected system. The attacker-supplied code would be executed with kernel privileges.","resolution":"Apply a patch Microsoft has published patches for this issue in Microsoft Security Bulletin MS06-032. Users are encouraged to review this bulletin and apply the patches it refers to.","workarounds":"Workarounds In addition to the patches, Microsoft has also published a number of workarounds for this issue in  Microsoft Security Bulletin MS06-032. Users, particularly those who are unable to apply the patch, are encouraged to implement these workarounds.","sysaffected":"","thanks":"Thanks to Microsoft Security for reporting this vulnerability. Microsoft, in turn, credits \nAndrey Minaev \nwith reporting this vulnerability to them.","author":"This document was written by Chad R Dougherty.","public":["h","t","t","p",":","/","/","w","w","w",".","m","i","c","r","o","s","o","f","t",".","c","o","m","/","t","e","c","h","n","e","t","/","s","e","c","u","r","i","t","y","/","b","u","l","l","e","t","i","n","/","m","s","0","6","-","0","3","2",".","m","s","p","x"],"cveids":["CVE-2006-2379"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-06-13T18:26:18Z","publicdate":"2006-06-13T00:00:00Z","datefirstpublished":"2006-06-13T19:22:21Z","dateupdated":"2006-06-13T19:26:28Z","revision":7,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"15","cam_population":"18","cam_impact":"18","cam_easeofexploitation":"14","cam_attackeraccessrequired":"15","cam_scorecurrent":"38.2725","cam_scorecurrentwidelyknown":"44.65125","cam_scorecurrentwidelyknownexploited":"70.16625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":38.2725,"vulnote":null}