Summary
This host is missing an important security update according to Microsoft Bulletin MS13-018.
Impact
Successful exploitation could allow attackers to exhaust the non-paged pool and render the system unusable or trigger a restart.
Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://technet.microsoft.com/en-us/security/bulletin/ms13-018
Insight
The flaw is due to an error within the TCP/IP stack, which remains in TCP FIN_WAIT_2 state after receiving an ACK to the FIN packet when handling a tear down sequence.
Affected
Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
References
Severity
Classification
-
CVE CVE-2013-0075 -
CVSS Base Score: 7.8
AV:N/AC:L/Au:N/C:N/I:N/A:C
Related Vulnerabilities
- Certificate Validation Flaw Could Enable Identity Spoofing (Q328145)
- Microsoft Distributed File System Remote Code Execution Vulnerabilities (2535512)
- Microsoft Active Directory Denial of Service Vulnerability (953235)
- Microsoft DHTML Editing Component ActiveX Remote Code Execution Vulnerability (956844)
- Microsoft IIS Authentication Remote Code Execution Vulnerability (982666)