Microsoft IPv6 TCP/IP Loopback LAND Denial of Service Vulnerability

The Microsoft Windows IPv6 TCP/IP stack is prone to a 'loopback' condition initiated by sending a TCP packet with the 'SYN' flag set and the source address and port spoofed to equal the destination source and port.

When a packet of this type is handled, an infinite loop is initiated and the affected system halts.

A remote attacker may exploit this issue to deny service for legitimate users.


 

Privacy Statement
Copyright 2010, SecurityFocus