Microsoft Windows XP SP2 and SP3, and Server 2003 SP1 and SP2, does not properly validate the option length field in Pragmatic General Multicast (PGM) packets, which allows remote attackers to cause a denial of service (infinite loop and system hang) via a crafted PGM packet, aka the "PGM Invalid Length Vulnerability."
The product receives input that is expected to specify a quantity (such as size or length), but it does not validate or incorrectly validates that the quantity has the required properties.
Link | Tags |
---|---|
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-036 | patch vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5473 | vdb entry signature broken link |
http://www.vupen.com/english/advisories/2008/1783 | vdb entry broken link |
http://www.us-cert.gov/cas/techalerts/TA08-162B.html | us government resource third party advisory broken link |
http://secunia.com/advisories/30587 | permissions required broken link third party advisory vendor advisory |
http://www.securityfocus.com/bid/29508 | patch vdb entry third party advisory broken link |
http://securitytracker.com/id?1020230 | vdb entry third party advisory broken link |