Publisher DOI: 10.22032/dbt.67106
Title: Critical analysis of CVE-2024-38063 : the Microsoft IPv6-vulnerability
Language: English
Authors: Kerutt, Bennet 
Lorenz, Bastian 
Schwarz, Monina 
Kaven, Sascha  
Skwarek, Volker  
Editor: Koldehofe, Boris 
Klingler, Florian 
Sommer, Christoph 
Hummel, Karin Anna 
Amthor, Peter 
Issue Date: 29-Aug-2025
Publisher: Technische Universität Ilmenau ; Universitätsbibliothek Ilmenau, ilmedia
Part of Series: Proceedings of the International Conference on Networked Systems 2025 (NetSys 2025) : Technische Universität Ilmenau, 1-4 September 2025 
Startpage: 5
Endpage: 8
Conference: International Conference on Networked Systems 2025 
Abstract: 
CVE-2024-38063 was claimed to be a critical remote code execution vulnerability in the Microsoft Windows IPv6 stack due to an integer underflow and heap-based buffer overflow. This paper analyzes the vulnerability's root cause, demonstrates a proof-of-concept exploit, and evaluates its reproducibility under various patch levels. The analysis highlights the implications of a conditional patch rollback mechanism and discusses mitigation strategies. Additionally, it recalculates the CVSS score basing on these findings.
URI: https://hdl.handle.net/20.500.12738/18242
Review status: This version was peer reviewed (peer review)
Institute: Forschungs- und Transferzentrum CyberSec 
Department Wirtschaftsingenieurwesen 
Fakultät Life Sciences 
Type: Chapter/Article (Proceedings)
Additional note: article number: 110
Appears in Collections:Publications without full text

Show full item record

Google ScholarTM

Check

HAW Katalog

Check

Add Files to Item

Note about this record


Items in REPOSIT are protected by copyright, with all rights reserved, unless otherwise indicated.