TCP/IP vulnerability could allow denial of service
Report ID: MS201302010
Date Published: 22 February 2013
Compromise Type: denial-of-service
Compromise From: remote
Windows Server 2008
Windows Server 2008 R2
Windows Server 2012
A denial of service vulnerability in the Windows TCP/IP stack could cause a system to stop responding and restart.
Microsoft has issued a security update to address a denial of service vulnerability in Windows TCP/IP stack. The vulnerability was caused by improper handling of a connection termination sequence, and can be exploited to cause a system to stop responding and automatically restart.
This issue has been resolved through the latest update which corrects the way that Windows TCP/IP stack handles connection termination sequence. Users are recommended to install this update onto their system as a protection measure.
Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms13-018)
F-Secure Health Check
F-Secure's free tool, the Health Check, detects if your system is missing the patch for the vulnerability covered in this report.