Lucene search

K
symantecSymantec Security ResponseSMNTC-53352
HistoryMay 08, 2012 - 12:00 a.m.

Microsoft Windows Firewall CVE-2012-0174 Security Bypass Vulnerability

2012-05-0800:00:00
Symantec Security Response
www.symantec.com
17

EPSS

0.008

Percentile

82.1%

Description

Microsoft Windows is prone to a security-bypass vulnerability that affects the TCP/IP stack (โ€˜tcpip.sysโ€™) component. An attacker can exploit this issue to bypass firewall restrictions of the system, that may aid in further attacks.

Technologies Affected

  • Avaya Aura Conferencing 6.0 SP1 Standard
  • Avaya Aura Conferencing 6.0 Standard
  • Avaya Aura Conferencing 6.0.0 Standard
  • Microsoft Windows 7 for 32-bit Systems
  • Microsoft Windows 7 for 32-bit Systems SP1
  • Microsoft Windows 7 for x64-based Systems
  • Microsoft Windows 7 for x64-based Systems SP1
  • Microsoft Windows Server 2008 R2 Itanium
  • Microsoft Windows Server 2008 R2 Itanium SP1
  • Microsoft Windows Server 2008 R2 x64
  • Microsoft Windows Server 2008 R2 x64 SP1
  • Microsoft Windows Server 2008 for 32-bit Systems
  • Microsoft Windows Server 2008 for 32-bit Systems SP2
  • Microsoft Windows Server 2008 for Itanium-based Systems
  • Microsoft Windows Server 2008 for Itanium-based Systems SP2
  • Microsoft Windows Server 2008 for x64-based Systems
  • Microsoft Windows Server 2008 for x64-based Systems SP2
  • Microsoft Windows Vista SP1
  • Microsoft Windows Vista SP2
  • Microsoft Windows Vista x64 Edition
  • Microsoft Windows Vista x64 Edition SP1
  • Microsoft Windows Vista x64 Edition SP2

Recommendations

Run all software as a nonprivileged user with minimal access rights.
To reduce the impact of latent vulnerabilities, always run nonadministrative software as an unprivileged user with minimal access rights.

Deploy network intrusion detection systems to monitor network traffic for malicious activity.
Deploy NIDS to monitor network traffic for signs of anomalous or suspicious activity. This may indicate exploit attempts or activity that results from successful exploits.

Vendor updates are available. Please see the references for more information.

EPSS

0.008

Percentile

82.1%