search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Microsoft Windows TCP/IP fails to properly validate IGMP packets

Vulnerability Note VU#839284

Original Release Date: 2006-02-14 | Last Revised: 2006-02-19

Overview

Microsoft Windows implementations of the TCP/IP protocol fail to properly validate IGMP packets, leading to a denial-of-service condition.

Description

TCP and IGMP

The Transmission Control Protocol (TCP) is defined in RFC 793 as a means to provide reliable host-to-host transmission between hosts in a packet-switched computer network. The Internet Group Management Protocol version 3 (IGMPv3) is defined in RFC 3376 as a protocol to help manage multicast connections over the internet.

The Vulnerability

The Microsoft implementation of TCP/IP fails to properly handle specially crafted IGMPv3 packets, possibly leading to a denial-of-service condition. For more information, including a list of vulnerable systems, please refer to Microsoft Security Bulletin MS06-007.

Impact

By sending a specially crafted IGMPv3 packet to a vulnerable system, an unauthenticated, remote attacker could cause that system to stop responding.

Solution

Apply an Update

Microsoft has addressed this issue in Microsoft Security Bulletin MS06-007.

Please see Microsoft Security Bulletin MS06-007 for a list of workarounds to mitigate this vulnerability.

Vendor Information

839284
 

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported in Microsoft Security Bulletin MS06-007. Microsoft credits Douglas Nascimento of Datacom with providing information regarding this issue.

This document was written by Jeff Gennari.

Other Information

CVE IDs: CVE-2006-0021
Severity Metric: 21.00
Date Public: 2006-02-14
Date First Published: 2006-02-14
Date Last Updated: 2006-02-19 13:38 UTC
Document Revision: 20

Sponsored by CISA.