1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar

Vulnerability protection

TCP/IP vulnerability could allow denial of service

Report ID: MS201302010
Date Published: 22 February 2013

Criticality: Important
Compromise Type: denial-of-service
Compromise From: remote

Affected Product/Component:

Windows Vista
Windows Server 2008
Windows 7
Windows Server 2008 R2
Windows 8
Windows Server 2012
Windows RT


A denial of service vulnerability in the Windows TCP/IP stack could cause a system to stop responding and restart.

Detailed Description

Microsoft has issued a security update to address a denial of service vulnerability in Windows TCP/IP stack. The vulnerability was caused by improper handling of a connection termination sequence, and can be exploited to cause a system to stop responding and automatically restart.

This issue has been resolved through the latest update which corrects the way that Windows TCP/IP stack handles connection termination sequence. Users are recommended to install this update onto their system as a protection measure.

CVE Reference



Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms13-018)

Security Advisories

For a list of known vulnerabilities affecting F-Secure products and the released fixes, please refer to the Security Advisories page.