Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution
Description: This security update resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if specially crafted packets are sent to a computer with IPv6 enabled. An attacker could try to exploit the vulnerability by creating specially crafted ICMPv6 packets and sending the packets to a system with IPv6 enabled. This vulnerability may only be exploited if the attacker is on-link. The security update addresses the vulnerabilities by changing the way Windows TCP/IP performs bounds checking and other packet handling operations.
Update type: Critical
Release date: February 9, 2010
Applies to: All versions
Knowledge base: http://support.microsoft.com/kb/974145
- ICMPv6 Router Advertisement Vulnerability – CVE-2010-0239
- Header MDL Fragmentation Vulnerability – CVE-2010-0240
- ICMPv6 Route Information Vulnerability – CVE-2010-0241
- TCP/IP Selective Acknowledgement Vulnerability – CVE-2010-0242
For more information on this issue, including potential causes, workarounds, and resolutions, see: Microsoft KB Article KB974145.