1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar

Vulnerability protection

ICMPv6 vulnerability could allow denial of service

Report ID: MS201308007
Date Published: 14 August 2013

Criticality: Important
Compromise Type: denial-of-service
Compromise From: remote

Affected Product/Component:

Windows Vista
Windows Server 2008
Windows 7
Windows Server 2008 R2
Windows 8
Windows Server 2012
Windows RT


A vulnerability that exists in the Windows TCP/IP stack could be exploited into causing a system to stop responding until restarted.

Detailed Description

Microsoft has issued a security update to address a vulnerability in the Windows TCP/IP stack that was caused by improper memory allocation when processing ICMPv6 packets. The vulnerability could cause an affected system to stop responding until it is restarted.

This vulnerability has been patched in the latest update which introduces a correction in the way that Windows TCP/IP stack allocates memory when processing ICMPv6 packets. Users are recommended to install the update onto their system as a protection measure against potential exploit attempts.

CVE Reference



Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms13-065)

Security Advisories

For a list of known vulnerabilities affecting F-Secure products and the released fixes, please refer to the Security Advisories page.