ICMPv6 vulnerability could allow denial of service
Report ID: MS201308007
Date Published: 14 August 2013
Criticality: Important
Compromise Type: denial-of-service
Compromise From: remote
Affected Product/Component:
Windows Vista
Windows Server 2008
Windows 7
Windows Server 2008 R2
Windows 8
Windows Server 2012
Windows RT
Summary
A vulnerability that exists in the Windows TCP/IP stack could be exploited into causing a system to stop responding until restarted.
Detailed Description
Microsoft has issued a security update to address a vulnerability in the Windows TCP/IP stack that was caused by improper memory allocation when processing ICMPv6 packets. The vulnerability could cause an affected system to stop responding until it is restarted.
This vulnerability has been patched in the latest update which introduces a correction in the way that Windows TCP/IP stack allocates memory when processing ICMPv6 packets. Users are recommended to install the update onto their system as a protection measure against potential exploit attempts.
CVE Reference
CVE-2013-3183
Solution
Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms13-065)
F-Secure Health Check
F-Secure's free tool, the Health Check, detects if your system is missing the patch for the vulnerability covered in this report.




