Code: Alles auswählen
**] [1:1384:8] MISC UPnP malformed advertisement [**]
[Classification: Misc Attack] [Priority: 2]
09/08-21:12:51.452606 192.168.2.1:1900 -> 239.255.255.250:1900
UDP TTL:4 TOS:0x0 ID:0 IpLen:20 DgmLen:306 DF
Len: 278
[Xref => http://www.microsoft.com/technet/security/bulletin/MS01-059.mspx][Xref => http://cv$
die url verweist interessanterweise hierauf:
was nervt mich denn da genau und gibts da abhilfe? die 192.168.2.1 ist übrigens mein router liegen tut das aber im subnet 255.255.255.0.nun ich hab kein windows darum werd ich wohl auch nicht patchen, aber sollte es diese lücke im pnp auch in debian geben? [/quote]Microsoft Security Bulletin MS01-059
Unchecked Buffer in Universal Plug and Play can Lead to System Compromise
Originally posted: December 20, 2001
Updated: May 09, 2003
Summary
Who should read this bulletin:
Customers using Microsoft® Windows® ME or XP, or who have installed the Windows XP Internet Connection Sharing client on Windows 98 or 98SE.
Impact of vulnerability:
Run code of attacker's choice.
Maximum Severity Rating:
Critical
Recommendation:
Microsoft strongly urges all Windows XP customers to apply the patch immediately. Customers using Windows 98, 98SE or ME should apply the patch if Universal Plug and Play support is installed and running.