Windows kernel-mode driver vulnerability could allow denial of service
Report ID: MS201306003
Date Published: 25 June 2013
Compromise Type: denial-of-service
Compromise From: remote
Windows Server 2008
Windows Server 2008 R2
Windows Server 2012
A denial of service vulnerability in Windows could cause an affected system to stop responding.
Microsoft has released a security update to address a denial of service vulnerability in Windows. The vulnerability was caused when the TCP/IP driver improperly handles packets during TCP connection. Upon successful exploitation, an attacker could cause the system to stop responding.
This issue has been resolved through the latest update by correcting the way that specially crafted packets are handled. Users are recommended to install the update to protect their system from potential exploit attempts.
Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms13-049)
F-Secure Health Check
F-Secure's free tool, the Health Check, detects if your system is missing the patch for the vulnerability covered in this report.