DC ElementWertSprache
dc.contributor.authorKerutt, Bennet-
dc.contributor.authorLorenz, Bastian-
dc.contributor.authorSchwarz, Monina-
dc.contributor.authorKaven, Sascha-
dc.contributor.authorSkwarek, Volker-
dc.date.accessioned2025-09-30T07:40:07Z-
dc.date.available2025-09-30T07:40:07Z-
dc.date.issued2025-08-29-
dc.identifier.urihttps://hdl.handle.net/20.500.12738/18242-
dc.description.abstractCVE-2024-38063 was claimed to be a critical remote code execution vulnerability in the Microsoft Windows IPv6 stack due to an integer underflow and heap-based buffer overflow. This paper analyzes the vulnerability's root cause, demonstrates a proof-of-concept exploit, and evaluates its reproducibility under various patch levels. The analysis highlights the implications of a conditional patch rollback mechanism and discusses mitigation strategies. Additionally, it recalculates the CVSS score basing on these findings.en
dc.language.isoenen_US
dc.publisherTechnische Universität Ilmenau ; Universitätsbibliothek Ilmenau, ilmediaen_US
dc.subject.ddc004: Informatiken_US
dc.titleCritical analysis of CVE-2024-38063 : the Microsoft IPv6-vulnerabilityen
dc.typeinProceedingsen_US
dc.relation.conferenceInternational Conference on Networked Systems 2025en_US
dc.description.versionPeerRevieweden_US
local.contributorPerson.editorKoldehofe, Boris-
local.contributorPerson.editorKlingler, Florian-
local.contributorPerson.editorSommer, Christoph-
local.contributorPerson.editorHummel, Karin Anna-
local.contributorPerson.editorAmthor, Peter-
tuhh.container.endpage8en_US
tuhh.container.startpage5en_US
tuhh.oai.showtrueen_US
tuhh.publication.instituteForschungs- und Transferzentrum CyberSecen_US
tuhh.publication.instituteDepartment Wirtschaftsingenieurwesenen_US
tuhh.publication.instituteFakultät Life Sciencesen_US
tuhh.publisher.doi10.22032/dbt.67106-
tuhh.relation.ispartofseriesProceedings of the International Conference on Networked Systems 2025 (NetSys 2025) : Technische Universität Ilmenau, 1-4 September 2025en_US
tuhh.type.opusInProceedings (Aufsatz / Paper einer Konferenz etc.)-
dc.type.casraiConference Paper-
dc.type.dinicontributionToPeriodical-
dc.type.drivercontributionToPeriodical-
dc.type.statusinfo:eu-repo/semantics/publishedVersionen_US
dcterms.DCMITypeText-
local.comment.externalarticle number: 110en_US
item.languageiso639-1en-
item.tuhhseriesidProceedings of the International Conference on Networked Systems 2025 (NetSys 2025) : Technische Universität Ilmenau, 1-4 September 2025-
item.creatorGNDKerutt, Bennet-
item.creatorGNDLorenz, Bastian-
item.creatorGNDSchwarz, Monina-
item.creatorGNDKaven, Sascha-
item.creatorGNDSkwarek, Volker-
item.cerifentitytypePublications-
item.openairecristypehttp://purl.org/coar/resource_type/c_5794-
item.creatorOrcidKerutt, Bennet-
item.creatorOrcidLorenz, Bastian-
item.creatorOrcidSchwarz, Monina-
item.creatorOrcidKaven, Sascha-
item.creatorOrcidSkwarek, Volker-
item.fulltextNo Fulltext-
item.grantfulltextnone-
item.openairetypeinProceedings-
item.seriesrefProceedings of the International Conference on Networked Systems 2025 (NetSys 2025) : Technische Universität Ilmenau, 1-4 September 2025-
crisitem.author.deptDepartment Wirtschaftsingenieurwesen-
crisitem.author.deptDepartment Wirtschaftsingenieurwesen-
crisitem.author.orcid0009-0001-0498-4460-
crisitem.author.orcid0000-0002-7260-6832-
crisitem.author.orcid0000-0001-5065-1029-
crisitem.author.parentorgFakultät Life Sciences-
crisitem.author.parentorgFakultät Life Sciences-
Enthalten in den Sammlungen:Publications without full text
Zur Kurzanzeige

Google ScholarTM

Prüfe

HAW Katalog

Prüfe

Volltext ergänzen

Feedback zu diesem Datensatz


Alle Ressourcen in diesem Repository sind urheberrechtlich geschützt.