{"vuid":"VU#839284","idnumber":"839284","name":"Microsoft Windows TCP/IP fails to properly validate IGMP packets","keywords":["Microsoft","Windows","TCP/IP","DoS","denial of service","IGMP packet","MS06-007"],"overview":"Microsoft Windows implementations of the TCP/IP protocol fail to properly validate IGMP packets, leading to a denial-of-service condition.","clean_desc":"TCP and IGMP The Transmission Control Protocol (TCP) is defined in RFC 793 as a means to provide reliable host-to-host transmission between hosts in a packet-switched computer network. The Internet Group Management Protocol version 3 (IGMPv3) is defined in RFC 3376 as a protocol to help manage multicast connections over the internet. The Vulnerability The Microsoft implementation of TCP/IP fails to properly handle specially crafted IGMPv3 packets, possibly leading to a denial-of-service condition. For more information, including a list of vulnerable systems, please refer to Microsoft Security Bulletin MS06-007.","impact":"By sending a specially crafted IGMPv3 packet to a vulnerable system, an unauthenticated, remote attacker could cause that system to stop responding.","resolution":"Apply an Update\nMicrosoft has addressed this issue in Microsoft Security Bulletin MS06-007.","workarounds":"Please see Microsoft Security Bulletin MS06-007 for a list of workarounds to mitigate this vulnerability.","sysaffected":"","thanks":"This vulnerability was reported in Microsoft Security Bulletin \nMS06-007\n. Microsoft credits \nDouglas Nascimento of \nDatacom\n with providing information regarding this issue.","author":"This document was written by Jeff Gennari.","public":["http://www.microsoft.com/technet/security/bulletin/ms06-007.mspx","http://www.ietf.org/rfc/rfc3376.txt","http://www.ietf.org/rfc/rfc793.txt"],"cveids":["CVE-2006-0021"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-02-14T18:36:13Z","publicdate":"2006-02-14T00:00:00Z","datefirstpublished":"2006-02-14T19:38:15Z","dateupdated":"2006-02-19T13:38:47Z","revision":20,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"20","cam_impact":"8","cam_easeofexploitation":"14","cam_attackeraccessrequired":"20","cam_scorecurrent":"21","cam_scorecurrentwidelyknown":"25.2","cam_scorecurrentwidelyknownexploited":"42","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":21.0,"vulnote":null}