[PCWorks] Windows TCP/IP Stack Teardown Sequence Handling Denial of Service Vulnerability

  • From: "Clint Hamilton-PCWorks Admin" <PCWorks@xxxxxxxxxxxxxxxxxxxxxxxx>
  • To: "PCWorks@xxxxxxxxxxxxx" <pcworks@xxxxxxxxxxxxx>
  • Date: Wed, 13 Feb 2013 00:14:36 -0600

TITLE:
Microsoft Windows TCP/IP Stack Teardown Sequence Handling 
Denial of
Service Vulnerability

Criticality level: Highly critical
Impact: DoS
Where: From remote

Operating Systems:
 Microsoft Windows 7
 Microsoft Windows 8
 Microsoft Windows RT
 Microsoft Windows Server 2008
 Microsoft Windows Server 2012
 Microsoft Windows Vista

SECUNIA ADVISORY ID:
http://secunia.com/advisories/52158/

DESCRIPTION:
A vulnerability has been reported in Microsoft Windows, which 
can be
exploited by malicious people to cause a DoS (Denial of 
Service).

The vulnerability is caused due to an error within the TCP/IP 
stack,
which remains in TCP FIN_WAIT_2 state after receiving an ACK to 
the
FIN packet when handling a teardown sequence. This can be 
exploited
to exhaust the non-paged pool and render the system unusable or
trigger a restart.

Successful exploitation requires having the victim machine 
initiate
the teardown sequence.

SOLUTION:
Apply updates.

ORIGINAL ADVISORY:
MS13-018 (KB2790655):
https://technet.microsoft.com/en-us/security/bulletin/ms13-018


=========================
The list's FAQ's can be seen by sending an email to 
PCWorks-request@xxxxxxxxxxxxx with FAQ in the subject line.

To unsubscribe, subscribe, set Digest or Vacation to on or off, go to 
//www.freelists.org/list/pcworks .  You can also send an email to 
PCWorks-request@xxxxxxxxxxxxx with Unsubscribe in the subject line.  Your 
member list settings can be found at 
//www.freelists.org/cgi-bin/lsg2.cgi/l=pcworks .  Once logged in, you have 
access to numerous other email options.  

The list archives are located at //www.freelists.org/archives/pcworks/ .  
All email posted to the list will be placed there in the event anyone needs to 
look for previous posts.
-zxdjhu-

Other related posts:

  • » [PCWorks] Windows TCP/IP Stack Teardown Sequence Handling Denial of Service Vulnerability - Clint Hamilton-PCWorks Admin