Eng
  1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar


Vulnerability protection

TCP/IP vulnerability could allow denial of service


Report ID: MS201302010
Date Published: 22 February 2013

Criticality: Important
Compromise Type: denial-of-service
Compromise From: remote


Affected Product/Component:

Windows Vista
Windows Server 2008
Windows 7
Windows Server 2008 R2
Windows 8
Windows Server 2012
Windows RT




Summary

A denial of service vulnerability in the Windows TCP/IP stack could cause a system to stop responding and restart.



Detailed Description

Microsoft has issued a security update to address a denial of service vulnerability in Windows TCP/IP stack. The vulnerability was caused by improper handling of a connection termination sequence, and can be exploited to cause a system to stop responding and automatically restart.

This issue has been resolved through the latest update which corrects the way that Windows TCP/IP stack handles connection termination sequence. Users are recommended to install this update onto their system as a protection measure.



CVE Reference

CVE-2013-0075



Solution

Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms13-018)



F-Secure Health Check

F-Secure's free tool, the Health Check, detects if your system is missing the patch for the vulnerability covered in this report.




Health Check

 
Evaluate your computer's security and see recommended updates for popular programs.

 

Security Advisories

For a list of known vulnerabilities affecting F-Secure products and the released fixes, please refer to the Security Advisories page.