Microsoft Windows XP SP2 and SP3, and Server 2003 SP1 and SP2, does not properly validate the option length field in Pragmatic General Multicast (PGM) packets, which allows remote attackers to cause a denial of service (infinite loop and system hang) via a crafted PGM packet, aka the “PGM Invalid Length Vulnerability.”
secunia.com/advisories/30587
securitytracker.com/id?1020230
www.securityfocus.com/bid/29508
www.us-cert.gov/cas/techalerts/TA08-162B.html
www.vupen.com/english/advisories/2008/1783
docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-036
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5473