Windows NAT Driver vulnerability could allow denial of service
Report ID: MS201308006
Date Published: 14 August 2013
Compromise Type: denial-of-service
Compromise From: remote
Windows Server 2012
A vulnerability in the Windows NAT Driver could be exploited into causing a system to stop responding and restart.
Microsoft has issued a security update to address a reported vulnerability in Windows NAT Driver. The vulnerability was caused by improper handling of ICMP packets, which could lead to memory corruption. Upon successful exploitation, the vulnerability could cause an affected system to stop responding and restart.
This vulnerability has been patched through the latest update by correcting the way that memory addresses were validated when handling ICMP packets. Users are recommended to install the update to protect their system from potential exploit attempts.
Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms13-064)
F-Secure Health Check
F-Secure's free tool, the Health Check, detects if your system is missing the patch for the vulnerability covered in this report.