x
48h OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
SPECIAL OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
HALLOWEEN OFFER
take advantage of our
terrific discounts
BUY NOW AND GET A 50% OFF
x
CHRISTMAS OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 40% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 50% OFF
x
BLACKFRIDAY OFFER
Buy the best antivirus
at the best price
TODAY ONLY UP TO 70% OFF
x
CYBERMONDAY OFFER
Buy the best antivirus
at the best price
(Only for homeusers)
TODAY ONLY UP TO 70% OFF
Active Scan. Scan your PC free
Panda Protection

Virus Encyclopedia

Welcome to the Virus Encyclopedia of Panda Security.

MS06-007

Threat LevelModerate threatDamageHighDistributionNot widespread
Common name:MS06-007
Technical name:MS06-007
Threat level:Low
Alias:Vulnerability in TCP/IP, Vulnerabilidad en TCP/IP
Type:Vulnerability
Effects:  

It is a vulnerability in the TCP/IP protocol on Windows 2003/XP computers, which allows hackers to launch remote Denial of Service attacks against the computer.

Affected platforms:

Windows 2003/XP

First detected on:Feb. 15, 2006
Detection updated on:Feb. 15, 2006
StatisticsNo

Brief Description 

    

MS06-007 is not categorized as virus, worm, Trojan or backdoor. It is an important vulnerability in the TCP/IP protocol on Windows 2003/XP computers, which allows to launch remote DoS (Denial of Service) attacks against the vulnerable computer.

If exploited successfully, MS06-007 allows hackers to cause the computer to stop responding, which could result in a degradation of network performance, reset of TCP connections, etc.

This vulnerability is usually exploited by creating a specially crafted IGMP (Internet Group Management Protocol) packet and sending it to a vulnerable computer.

 

If you have a Windows 2003/XP computer, it is recommendable to download and apply the security patch for this vulnerability. Click here to access the web page for downloading the patch.