the more serious of the two vulnerabilities, involves the way the TCP/IP stack handles IGMP protocol packets. Mark researched the exploitability of this issue and you’ll find his research and more detail about the vulnerability in the next blog post.