TITLE: Microsoft Windows TCP/IP Stack Teardown Sequence Handling Denial of Service Vulnerability Criticality level: Highly critical Impact: DoS Where: From remote Operating Systems: Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows RT Microsoft Windows Server 2008 Microsoft Windows Server 2012 Microsoft Windows Vista SECUNIA ADVISORY ID: http://secunia.com/advisories/52158/ DESCRIPTION: A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error within the TCP/IP stack, which remains in TCP FIN_WAIT_2 state after receiving an ACK to the FIN packet when handling a teardown sequence. This can be exploited to exhaust the non-paged pool and render the system unusable or trigger a restart. Successful exploitation requires having the victim machine initiate the teardown sequence. SOLUTION: Apply updates. ORIGINAL ADVISORY: MS13-018 (KB2790655): https://technet.microsoft.com/en-us/security/bulletin/ms13-018 ========================= The list's FAQ's can be seen by sending an email to PCWorks-request@xxxxxxxxxxxxx with FAQ in the subject line. To unsubscribe, subscribe, set Digest or Vacation to on or off, go to //www.freelists.org/list/pcworks . You can also send an email to PCWorks-request@xxxxxxxxxxxxx with Unsubscribe in the subject line. Your member list settings can be found at //www.freelists.org/cgi-bin/lsg2.cgi/l=pcworks . Once logged in, you have access to numerous other email options. The list archives are located at //www.freelists.org/archives/pcworks/ . All email posted to the list will be placed there in the event anyone needs to look for previous posts. -zxdjhu-