Published:2010/08/13  Last Updated:2010/08/13

Microsoft Windows denial of service (DoS) vulnerability


Microsoft Windows contains a denial of service (DoS) vulnerability.

Products Affected

  • Windows Vista
  • Windows Vista x64 Edition
  • Windows Server 2008
  • Windows Server 2008 for x64-based Systems
  • Windows Server 2008 for Itanium-based Systems
  • Windows 7
  • Windows 7 for x64-based Systems
  • Windows Server 2008 R2 for x64-based Systems
  • Windows Server 2008 R2 for Itanium-based Systems
For more information, refer to the developer's website.


Microsoft Windows contains a denial of service (DoS) vulnerability caused by IPv6 packets with malformed extension headers.


A remote attacker could possibly cause a denial of service (DoS) by sending specially crafted IPv6 packets.


Update the software
Update to the latest version according to the information provided by the developer.

Vendor Status

Vendor Status Last Update Vendor Notes
Microsoft Co.,Ltd. Vulnerable 2010/08/13


JPCERT/CC Addendum

The security update for this vulnerability is contained in the Microsoft Security Bulletin Summary for August 2010.

Vulnerability Analysis by JPCERT/CC

Analyzed on 2010.08.13

Measures Conditions Severity
Access Required Routed - can be attacked over the Internet using packets
  • High
Authentication None - anonymous or no authentication (IP addresses do not count)
  • High
User Interaction Required None - the vulnerability can be exploited without an honest user taking any action
  • High
Exploit Complexity Low-Medium - some expertise and/or luck required (most buffer overflows, guessing correctly in small space, expertise in Windows function calls)
  • Medium-High

Description of each analysis measures


Darren Willis of Fourteenforty Research Institute Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert JPCERT-AT-2010-0020
JPCERT Reports
CERT Advisory Technical Cyber Security Alert TA10-222A
CPNI Advisory
CVE CVE-2010-1892
JVN iPedia JVNDB-2010-000031

Update History