Rapid7 VulnDB

MS09-048: Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution (967723)

Back to Search

MS09-048: Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution (967723)

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
09/08/2009
Created
07/25/2018
Added
09/08/2009
Modified
03/22/2018

Description

This security update resolves several privately reported vulnerabilities in Transmission Control Protocol/Internet Protocol (TCP/IP) processing. The vulnerabilities could allow remote code execution if an attacker sent specially crafted TCP/IP packets over the network to a computer with a listening service. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed.

Solution(s)

  • WINDOWS-HOTFIX-MS09-048-2549dc47-30e8-4792-be59-45bedb644aca
  • WINDOWS-HOTFIX-MS09-048-3f5fa8bc-0d3c-4dff-bf69-6ba864aa967f
  • WINDOWS-HOTFIX-MS09-048-8181567d-ec57-4b9c-a351-f48324c5d274
  • WINDOWS-HOTFIX-MS09-048-931af6a7-b09a-4a80-be12-da2c741bd257
  • WINDOWS-HOTFIX-MS09-048-ae2c61ed-ac12-4369-bed6-4375cd79ca6d
  • WINDOWS-HOTFIX-MS09-048-b648ce62-7204-4b44-91ab-0b19990bb8e2
  • WINDOWS-HOTFIX-MS09-048-d50dfa86-28a7-4cdb-bc71-5f6f09f8561b
  • WINDOWS-HOTFIX-MS09-048-f6628171-c942-42cb-8c3f-82cd8ef4fe5d

References

  • WINDOWS-HOTFIX-MS09-048-2549dc47-30e8-4792-be59-45bedb644aca
  • WINDOWS-HOTFIX-MS09-048-3f5fa8bc-0d3c-4dff-bf69-6ba864aa967f
  • WINDOWS-HOTFIX-MS09-048-8181567d-ec57-4b9c-a351-f48324c5d274
  • WINDOWS-HOTFIX-MS09-048-931af6a7-b09a-4a80-be12-da2c741bd257
  • WINDOWS-HOTFIX-MS09-048-ae2c61ed-ac12-4369-bed6-4375cd79ca6d
  • WINDOWS-HOTFIX-MS09-048-b648ce62-7204-4b44-91ab-0b19990bb8e2
  • WINDOWS-HOTFIX-MS09-048-d50dfa86-28a7-4cdb-bc71-5f6f09f8561b
  • WINDOWS-HOTFIX-MS09-048-f6628171-c942-42cb-8c3f-82cd8ef4fe5d

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;