Описание
Microsoft Windows XP SP2 and SP3, and Server 2003 SP1 and SP2, does not properly validate the option length field in Pragmatic General Multicast (PGM) packets, which allows remote attackers to cause a denial of service (infinite loop and system hang) via a crafted PGM packet, aka the "PGM Invalid Length Vulnerability."
Ссылки
- Broken LinkPermissions RequiredVendor Advisory
- Broken LinkThird Party AdvisoryVDB Entry
- Broken LinkPatchThird Party AdvisoryVDB Entry
- Broken LinkThird Party AdvisoryUS Government Resource
- Broken Link
- PatchVendor Advisory
- Broken Link
- Broken LinkPermissions RequiredVendor Advisory
- Broken LinkThird Party AdvisoryVDB Entry
- Broken LinkPatchThird Party AdvisoryVDB Entry
- Broken LinkThird Party AdvisoryUS Government Resource
- Broken Link
- PatchVendor Advisory
- Broken Link
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:o:microsoft:windows_server_2003:*:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*
EPSS
Процентиль: 98%
0.50592
Средний
7.1 High
CVSS2
Дефекты
CWE-1284
Связанные уязвимости
github
почти 4 года назад
Microsoft Windows XP SP2 and SP3, and Server 2003 SP1 and SP2, does not properly validate the option length field in Pragmatic General Multicast (PGM) packets, which allows remote attackers to cause a denial of service (infinite loop and system hang) via a crafted PGM packet, aka the "PGM Invalid Length Vulnerability."
EPSS
Процентиль: 98%
0.50592
Средний
7.1 High
CVSS2
Дефекты
CWE-1284