DV Hardware - bringing you the hottest news about processors, graphics cards, Intel, AMD, NVIDIA, hardware and technology!
   Home | News submit | News Archives | Reviews | Articles | Howto's | Advertise
 
DarkVision Hardware - Daily tech news
October 24, 2020 
Main Menu
Home
Info
News archives
Articles
Howto
Reviews
 

Who's Online
There are currently 224 people online.

 

Latest Reviews
Ewin Racing Flash gaming chair
Arctic BioniX F120 and F140 fans
Jaybird Freedom 2 wireless sport headphones
Ewin Racing Champion gaming chair
Zowie P-TF Rough mousepad
Zowie FK mouse
BitFenix Ronin case
Ozone Rage ST headset
 

Follow us
RSS
 

Ping of Death vulnerability makes a return in Windows 10

Posted on Thursday, October 15 2020 @ 12:23:58 CEST by


MSFT logo
Sophos security researchers discovered a new Ping of Death vulnerability in Windows 10. A bug in the Windows' TCP/IP driver allows an attacker to send a specially crafted packet that will crash your PC. Besides causing a Blue Screen of Death (BSOD), the bug may also allow remote code execution, but Sophos thinks such an attack will be hard to pull off.

Interestingly, this is the second time Windows is affected by a Ping of Death vulnerability. A similar vulnerability in the TCP/IP driver got patched in 2013.
The vulnerability in tcpip.sys, a logic error in how the driver parses ICMP messages, can be triggered remotely with a crafted IPv6 router advertisement packet containing a Recursive DNS Server (RDNSS) option. The RDNSS option typically contains a list of the IPv6 addresses of one or more recursive DNS servers.

There is a logic flaw in tcpip.sys that can be exploited by crafting a router advertisement packet containing more data than expected, which results in the driver putting more bytes of data on its memory stack than provided for in the driver’s code, resulting in a buffer overflow. In theory, this could be used for both denial of service and remote code execution attacks. But in practice, achieving remote code execution would be extremely difficult.
The vulnerability was patched via this week's Patch Tuesday updates from Microsoft.



 



 

DV Hardware - Privacy statement
All logos and trademarks are property of their respective owner.
The comments are property of their posters, all the rest © 2002-2020 DM Media Group bvba