MS13-018: Vulnerability in TCP/IP Could Allow Denial of Service (2790655)

high Nessus Plugin ID 64579

Synopsis

The remote Windows host is affected by a denial of service vulnerability.

Description

The remote Windows host is affected by a denial of service vulnerability due to the Windows TCP/IP stack improperly handling a connection termination sequence. An attacker could use a specially crafted packer to exploit this vulnerability and cause a target system to stop responding and restart.

Solution

Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, and 2012.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2013/ms13-018

Plugin Details

Severity: High

ID: 64579

File Name: smb_nt_ms13-018.nasl

Version: 1.10

Type: local

Agent: windows

Published: 2/12/2013

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Ease: No known exploits are available

Patch Publication Date: 2/12/2013

Vulnerability Publication Date: 2/12/2013

Reference Information

CVE: CVE-2013-0075

BID: 57858

MSFT: MS13-018

MSKB: 2790655