Microsoft Windows vulnerability could allow security bypass
Report ID: MS201301006
Date Published: 10 January 2013
Criticality: Important
Compromise Type: security-bypass
Compromise From: remote
Affected Product/Component:
Windows Vista
Windows Server 2008
Windows 7
Windows Server 2008 R2
Windows 8
Windows Server 2012
Windows RT
Summary
A vulnerability that exists when Microsoft Windows SSL/TLS handles SSL and TLS protocols could allow security bypass upon successful exploitation.
Detailed Description
Microsoft has released a security update to address a security bypass vulnerability that exists when handling SSL and TLS protocols. Caused by improper handling of SSL/TLS session version negotiation, the vulnerability may allow an attacker to bypass security feature by injecting specially crafted content into the SSL /TLS session.
This vulnerability has been resolved in the latest update by modifying the way of handling encrypted network packets. Users are recommended to install this update onto their system to protect from potential attacks or exploit attempts.
CVE Reference
CVE-2013-0013
Solution
Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms13-013)
F-Secure Health Check
F-Secure's free tool, the Health Check, detects if your system is missing the patch for the vulnerability covered in this report.




