MS Windows Vista forged ARP packet Network Stack DoS Exploit

omgI’m not sure how recent this is but Daniel Cid brought it to my attention.

Description: Microsoft Windows Vista (SP0) dumps interfaces when it receives this ARP packet. This DoS is useful for an internet cafe, wireless venue, or legitimate local attack. The victim will need to manually refresh their network interface. OK, sure it’s a dumb local attack, but why does Vista disable iface!?!??

The python code can be found here: http://www.milw0rm.com/exploits/3926

Try it out, it’s kind of…well…disturbing.

One comment

  1. LonerVamp says:

    Haha, I hope this is a result of Microsoft insisting on writing their own TCP/IP stacks and following standards only when they want to! 🙁

    Sounds like a fun exploit though, I need to check it out when not at work. 🙂

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Scroll to top