Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows Vista, which can be exploited by malicious, local users to cause a DoS (Denial of Service).
49f461ccf10e407543bb9c62bb9bbb3e23799b4bfac01cea0fda66077747a9a5
----------------------------------------------------------------------
Did you know that a change in our assessment rating, exploit code
availability, or if an updated patch is released by the vendor, is
not part of this mailing-list?
Click here to learn more:
http://secunia.com/advisories/business_solutions/
----------------------------------------------------------------------
TITLE:
Windows Vista "CreateIpForwardEntry2()" Memory Corruption
Vulnerability
SECUNIA ADVISORY ID:
SA32791
VERIFY ADVISORY:
http://secunia.com/advisories/32791/
CRITICAL:
Not critical
IMPACT:
DoS
WHERE:
Local system
OPERATING SYSTEM:
Microsoft Windows Vista
http://secunia.com/advisories/product/13223/
DESCRIPTION:
A vulnerability has been reported in Microsoft Windows Vista, which
can be exploited by malicious, local users to cause a DoS (Denial of
Service).
The vulnerability is caused due to the "CreateIpForwardEntry2()"
function not properly limiting the length of the IP address prefix of
the destination IP address passed via the "MIB_IPFORWARD_ROW2"
structure. This can be exploited to cause a buffer overflow and e.g.
crash a vulnerable system.
Successful exploitation requires that the attacker is a member of the
"Network Configuration Operators Group".
The vulnerability is reported in Microsoft Windows Vista Enterprise
(32 bit and 64 bit) and Microsoft Windows Vista Ultimate (32 bit and
64 bit). Other versions may also be affected.
SOLUTION:
Only add trusted users to the "Network Configuration Operators
Group".
PROVIDED AND/OR DISCOVERED BY:
Marius Wachtler, Michael Burgbacher, Carson Hounshell, Michael
Craggs, and Thomas Unterleitner of phion AG
ORIGINAL ADVISORY:
http://marc.info/?l=bugtraq&m=122711627932563&w=2
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------