Microsoft Windows TCP/IP Stack Two Vulnerabilities
Release Date : 2012-05-08
Criticality level : Less critical
Impact : Privilege Escalation
Where : Local system
Solution Status : Vendor Patch
Operating System: Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows Vista
Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious, local users to bypass certain security restrictions and gain escalated privileges.
1) An error within the TCP/IP stack (tcpip.sys) does not properly filter outbound packets when an outbound firewall rule is applied. This can be exploited to bypass the Windows Firewall and send otherwise restricted packets.
2) A double free error exists within the TCP/IP stack (tcpip.sys) when handling IPv6 address binding on a local interface.
Successful exploitation of this vulnerability allows execution of arbitrary code in context of another process.
NOTE: This vulnerability only affects Windows 7 and Windows Server 2008 R2.
Provided and/or discovered by:
1) The vendor credits Bojan Zdrnja, INFIGO IS.
2) Reported by the vendor.