First published: Wed Feb 10 2010(Updated: )
The TCP/IP implementation in Microsoft Windows Vista Gold, SP1, and SP2 and Server 2008 Gold and SP2, when IPv6 is enabled, does not properly perform bounds checking on ICMPv6 Router Advertisement packets, which allows remote attackers to execute arbitrary code via crafted packets, aka "ICMPv6 Router Advertisement Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =gold | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Vista | ||
Microsoft Windows Vista | ||
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Vista | =sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0239 is classified as critical due to its potential to allow remote code execution.
To address CVE-2010-0239, apply the relevant security updates provided by Microsoft for Windows Vista and Server 2008.
CVE-2010-0239 affects Microsoft Windows Vista (Gold, SP1, SP2) and Microsoft Windows Server 2008 (Gold, SP2) with IPv6 enabled.
Exploitation of CVE-2010-0239 may lead to arbitrary code execution, compromising the affected system.
Yes, CVE-2010-0239 can be exploited remotely through crafted ICMPv6 Router Advertisement packets.