First published: Tue Sep 08 2009(Updated: )
The TCP/IP implementation in Microsoft Windows Vista Gold, SP1, and SP2 and Server 2008 Gold and SP2 does not properly manage state information, which allows remote attackers to execute arbitrary code by sending packets to a listening service, and thereby triggering misinterpretation of an unspecified field as a function pointer, aka "TCP/IP Timestamps Code Execution Vulnerability."
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Server 2008 | ||
Microsoft Windows Server 2008 | ||
Microsoft Windows Server 2008 | =sp2 | |
Microsoft Windows Vista | ||
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Server 2008 | =sp2 | |
Microsoft Windows Vista | =sp1 | |
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Vista | ||
Microsoft Windows Server 2008 | ||
Microsoft Windows Server 2008 | =sp2 | |
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Vista | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.