x
48h OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
SPECIAL OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
HALLOWEEN OFFER
take advantage of our
terrific discounts
BUY NOW AND GET A 50% OFF
x
CHRISTMAS OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 40% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 50% OFF
x
BLACKFRIDAY OFFER
Buy the best antivirus
at the best price
TODAY ONLY UP TO 70% OFF
x
CYBERMONDAY OFFER
Buy the best antivirus
at the best price
(Only for homeusers)
TODAY ONLY UP TO 70% OFF
Active Scan. Scan your PC free
Panda Protection

Virus Encyclopedia

Welcome to the Virus Encyclopedia of Panda Security.

MS08-036

Threat LevelLow threatDamageHighDistributionNot widespread
Common name:MS08-036
Technical name:MS08-036
Threat level:Medium
Alias:Vulnerabilities in Pragmatic General Multicast (PGM) Could Allow Denial of Service
Type:Vulnerability
Effects:  

It is a group of important vulnerabilities in the Pragmatic General MultiCast (PGM) on Windows 2008/Vista/2003/XP computers, which allows to launch Denial of Service attacks.

Affected platforms:

Windows 2003/XP

First detected on:June 11, 2008
Detection updated on:June 11, 2008
StatisticsNo

Brief Description 

    

MS08-036 is not categorized as virus, worm, Trojan or backdoor. It is a group of important vulnerabilities in the Pragmatic General Multicast on Windows 2008/Vista/2003/XP computers, which allows to launch Denial of Service attacks.

The Pragmatic General Multicast (PGM) is a protocol that enables receivers to detect loss, request retransmission of lost data or notify an application of unrecoverable loss.

MS08-036 allows hackers to cause the computer to stop responding and automatically restart.

This vulnerability is exploited by creating specially crafted PGM packets and sending them to a vulnerable computer.

 

If you have a Windows 2008/Vista/2003/XP computer, it is recommended to download and apply the security patch for this vulnerability. Click here to access the web page for downloading the patch.