TCP/IP Timestamps Code Execution Vulnerability
Publish Date: 21 Februar 2011
Schweregrad:: Kritisch
CVE Kennungen:: CVE-2009-1925,MS09-048
Hinweisdatum: 21 Februar 2011
Beschreibung
The TCP/IP implementation in Microsoft Windows Vista Gold, SP1, and SP2 and Server 2008 Gold and SP2 does not properly manage state information, which allows remote attackers to execute arbitrary code by sending packets to a listening service, and thereby triggering misinterpretation of an unspecified field as a function pointer, aka "TCP/IP Timestamps Code Execution Vulnerability."
Trend Micro Lösungen
Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules.
Betroffene Software und Version:
- microsoft windows_2000 -
- microsoft windows_server_2003
- microsoft windows_server_2008
- microsoft windows_server_2008 -
- microsoft windows_vista
- microsoft windows_vista -