ID CVE-2011-1965
Summary Tcpip.sys in the TCP/IP stack in Microsoft Windows 7 Gold and SP1 and Windows Server 2008 R2 and R2 SP1 does not properly implement URL-based QoS, which allows remote attackers to cause a denial of service (reboot) via a crafted URL to a web server, aka "TCP/IP QOS Denial of Service Vulnerability."
References
Vulnerable Configurations
  • Microsoft Windows 7
    cpe:2.3:o:microsoft:windows_7
  • Microsoft Windows 7 64-bit Service Pack 1 (initial release)
    cpe:2.3:o:microsoft:windows_7:-:sp1:x64
  • Microsoft Windows 7 x86 Service Pack 1
    cpe:2.3:o:microsoft:windows_7:-:sp1:x86
  • Windows Server 2008 R2 for Itanium-based Systems
    cpe:2.3:o:microsoft:windows_server_2008:r2:-:itanium
  • Windows Server 2008 R2 for 32-bit Systems
    cpe:2.3:o:microsoft:windows_server_2008:r2:-:x64
  • Microsoft Windows Server 2008 r2 Service Pack 1 Itanium
    cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:itanium
  • Microsoft Windows Server 2008 R2 Service Pack 1 x64 (64-bit)
    cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:x64
CVSS
Base: 7.1 (as of 11-08-2011 - 10:22)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
exploit-db via4
description Windows - TCP/IP Stack Denial of Service (MS11-064). CVE-2011-1965. Dos exploit for windows platform
id EDB-ID:17981
last seen 2016-02-02
modified 2011-10-15
published 2011-10-15
reporter Byoungyoung Lee
source https://www.exploit-db.com/download/17981/
title Windows - TCP/IP Stack Denial of Service MS11-064
msbulletin via4
bulletin_id MS11-064
bulletin_url
date 2011-08-09T00:00:00
impact Denial of Service
knowledgebase_id 2563894
knowledgebase_url
severity Important
title Vulnerabilities in TCP/IP Stack Could Allow Denial of Service
nessus via4
  • NASL family Windows : Microsoft Bulletins
    NASL id SMB_NT_MS11-064.NASL
    description The TCP/IP stack in use on the remote Windows host is potentially affected by the following denial of service vulnerabilities : - By sending a sequence of specially crafted ICMP messages, an unauthenticated, remote attacker could cause the affected host to stop responding and automatically reboot. (CVE-2011-1871) - By sending a request with a specially crafted URL, an unauthenticated, remote attacker may be able to cause the affected host to stop responding and automatically reboot if it is serving web content and has URL-based QoS (Quality of Service) enabled. (CVE-2011-1965)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 55794
    published 2011-08-09
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=55794
    title MS11-064: Vulnerabilities in TCP/IP Stack Could Allow Denial of Service (2563894)
  • NASL family Windows
    NASL id QOS_KB2563894.NASL
    description The TCP/IP stack in use on the remote Windows host is potentially affected by a denial of service vulnerability. By sending a request with a specially crafted URL, an unauthenticated, remote attacker may be able to cause the affected host to stop responding and automatically reboot if it is serving web content and has URL-based QoS (Quality of Service) enabled.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 56044
    published 2011-09-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=56044
    title MS11-064: Vulnerabilities in TCP/IP Stack Could Allow Denial of Service (2563894) (uncredentialed check)
oval via4
accepted 2011-09-26T04:00:05.155-04:00
class vulnerability
contributors
name Josh Turpin
organization Symantec Corporation
definition_extensions
  • comment Microsoft Windows 7 (32-bit) is installed
    oval oval:org.mitre.oval:def:6165
  • comment Microsoft Windows 7 x64 Edition is installed
    oval oval:org.mitre.oval:def:5950
  • comment Microsoft Windows Server 2008 R2 x64 Edition is installed
    oval oval:org.mitre.oval:def:6438
  • comment Microsoft Windows Server 2008 R2 Itanium-Based Edition is installed
    oval oval:org.mitre.oval:def:5954
  • comment Microsoft Windows 7 (32-bit) Service Pack 1 is installed
    oval oval:org.mitre.oval:def:12292
  • comment Microsoft Windows 7 x64 Service Pack 1 is installed
    oval oval:org.mitre.oval:def:12627
  • comment Microsoft Windows Server 2008 R2 x64 Service Pack 1 is installed
    oval oval:org.mitre.oval:def:12567
  • comment Microsoft Windows Server 2008 R2 Itanium-Based Edition Service Pack 1 is installed
    oval oval:org.mitre.oval:def:12583
description Tcpip.sys in the TCP/IP stack in Microsoft Windows 7 Gold and SP1 and Windows Server 2008 R2 and R2 SP1 does not properly implement URL-based QoS, which allows remote attackers to cause a denial of service (reboot) via a crafted URL to a web server, aka "TCP/IP QOS Denial of Service Vulnerability."
family windows
id oval:org.mitre.oval:def:12318
status accepted
submitted 2011-08-10T13:00:00
title TCP/IP QOS Denial of Service Vulnerability
version 40
packetstorm via4
data source https://packetstormsecurity.com/files/download/105866/MS11-064.txt
id PACKETSTORM:105866
last seen 2016-12-05
published 2011-10-16
reporter Byoungyoung Lee
source https://packetstormsecurity.com/files/105866/MS11-064-TCP-IP-Stack-Denial-Of-Service.html
title MS11-064 TCP/IP Stack Denial Of Service
refmap via4
cert TA11-221A
ms MS11-064
sreason 8474
Last major update 13-02-2012 - 23:06
Published 10-08-2011 - 17:55
Last modified 30-10-2018 - 12:27
Back to Top