ICMPv6 vulnerability could allow denial of service
Report ID: MS201308007
Date Published: 14 August 2013
Compromise Type: denial-of-service
Compromise From: remote
Windows Server 2008
Windows Server 2008 R2
Windows Server 2012
A vulnerability that exists in the Windows TCP/IP stack could be exploited into causing a system to stop responding until restarted.
Microsoft has issued a security update to address a vulnerability in the Windows TCP/IP stack that was caused by improper memory allocation when processing ICMPv6 packets. The vulnerability could cause an affected system to stop responding until it is restarted.
This vulnerability has been patched in the latest update which introduces a correction in the way that Windows TCP/IP stack allocates memory when processing ICMPv6 packets. Users are recommended to install the update onto their system as a protection measure against potential exploit attempts.
Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms13-065)
F-Secure Health Check
F-Secure's free tool, the Health Check, detects if your system is missing the patch for the vulnerability covered in this report.