[LAC-TF] Windows TCP/IP Remote Code Execution Vulnerability - ICMPv6 Router Advertisement

Azael Fernandez Alcantara afaza at unam.mx
Thu Oct 15 12:06:05 -03 2020


Que esta relacionado con lo que habia enviado Fernando

SALUDOS
_______
Azael

___________________________
Mensaje enviado sin acentos

On Thu, 15 Oct 2020, Azael Fernandez Alcantara wrote:

> Buen Dia,
>
> Les comparto esta info. , para que apliquen el parche y no tengan que 
> desactivar la funcionalidad descrita:
>
> "Critical TCP/IP bug gets fixed for October Patch Tuesday"
>
> Cito:
> .."ICMPv6 Router Advertisements can be blocked or dropped at the network 
> perimeter, .. "
>
> https://searchwindowsserver.techtarget.com/news/252490539/Critical-TCP-IP-bug-gets-fixed-for-October-Patch-Tuesday?src=6643641&asrc=EM_ERU_137731218&utm_medium=EM&utm_source=ERU&utm_campaign=20201015_ERU%20Transmission%20for%2010/15/2020%20(UserUniverse:%20316738)&utm_content=eru-rd2-rcpC
>
>
> "CVE-2020-16898 | Windows TCP/IP Remote Code Execution Vulnerability"
> https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16898
>
> cito:
> "A remote code execution vulnerability exists when the Windows TCP/IP stack 
> improperly handles ICMPv6 Router Advertisement packets."
>
>
>
>
> SALUDOS
> _______
> Azael
>
> ___________________________
> Mensaje enviado sin acentos
>
>
> _______________________________________________
> LACTF mailing list
> LACTF at lacnic.net
> https://mail.lacnic.net/mailman/listinfo/lactf
> Cancelar suscripcion: lactf-unsubscribe at lacnic.net
>


More information about the LACTF mailing list