Summary
This host is missing an important security update according to Microsoft Bulletin MS13-049.
Impact
Successful exploitation could allow attackers to cause a denial of service.
Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, https://technet.microsoft.com/en-us/security/bulletin/ms13-049
Insight
The flaw is due to an integer overflow error within Windows TCP/IP driver when handling packets during TCP connection, which can be exploited to cause the system to stop responding.
Affected
Microsoft Windows 8
Microsoft Windows Server 2012
Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
References
Severity
Classification
-
CVE CVE-2013-3138 -
CVSS Base Score: 7.1
AV:N/AC:M/Au:N/C:N/I:N/A:C
Related Vulnerabilities
- Microsoft Filter Pack Remote Code Execution Vulnerability (2801261)
- Microsoft DirectShow Remote Code Execution Vulnerability (977935)
- Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (972270)
- Message Queuing Remote Code Execution Vulnerability (951071) - Remote
- Microsoft Expression Design Remote Code Execution Vulnerability (2651018)