Skip to main content

Hitachi
Contact UsContact Us

HIRT-PUB11004: Microsoft Windows XP vulnerable to denial-of-service (DoS)

(JVN#06924191, JVNDB-2011-000064)

Last Updated: September 30, 2011

HIRT reports the vulnerabilities to JVN in line with the framework of vulnerability handling - Information Security Early Warning Partnership.

1. Overview

Microsoft Windows XP contains an issue when processing TCP packets, which may result in a denial-of-service (DoS).

CVSS Severity

 Base Metrics: 4.3
  Access Vector: Network
  Access Complexity: Medium
  Authentication: None
  Confidentiality Impact: None
  Integrity Impact: None
  Availability Impact: Partial

 Temporal Metrics 3.5 (August 19, 2011)
  Exploitablity: Proof of concept code
  Remediation Level: Temporary fix
  Report Confidence: Confirmed

2. Affected Systems

+ Windows XP

3. Impact

Potential packet flood denial of service (DoS) when malicious TCP packet is received. DoS may be converged autonomously in some cases such as Figure 1.

Figure 1: Experimental verification of this vulneravility (case of autonomous convergence).
Figure 1: Experimental verification of this vulneravility (case of autonomous convergence).

4. Solution

The following workaround may mitigate the affects of this vulnerability.

+ Use a Microsoft Windows XP firewall or network firewall to limit access to affected ports.

5. Vulnerability report timeline

[2009-09-21] Confirmation of this vulnerability in Microsoft Windows XP SP3.
[2009-09-25] Vulnerability reported to vendor.
[2010-06-07] Vendor Response (Vendor confirms this issue).
[2010-06-24] Notification to vendor about "Vulnerability report to JVN".
[2010-07-01] Vulnerability reported JVN in line with the Information Security Early Warning Partnership.
[2011-08-01] Coordinated public release.

6. References

6.1 Vulnerability Enumeration

6.2 Other

7. Update history

September 30, 2011
  • This webpage was newly created and published.

Masato Terada (HIRT), Naoko Ohnishi (HIRT) and Hiroko Okashita