
8/11/2011

17/10/2024
CVE-2011-2013: Integer Overflow
First published: Tue Nov 08 2011(Updated: )
Integer overflow in the TCP/IP implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code by sending a sequence of crafted UDP packets to a closed port, aka "Reference Counter Overflow Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|
Microsoft Windows 7 | | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =r2 | |
Microsoft Windows Server 2008 Itanium | =r2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2011-2013?
CVE-2011-2013 has a critical severity rating due to its potential to allow remote code execution.
How do I fix CVE-2011-2013?
To fix CVE-2011-2013, apply the latest security update provided by Microsoft for the affected versions of Windows.
Which systems are vulnerable to CVE-2011-2013?
CVE-2011-2013 affects Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 and their respective service packs.
What kind of attack does CVE-2011-2013 enable?
CVE-2011-2013 allows attackers to execute arbitrary code by sending crafted UDP packets to a closed port.
What are the implications of CVE-2011-2013 for system administrators?
System administrators must ensure their systems are updated to mitigate risks associated with CVE-2011-2013.
- agent/author
- agent/type
- agent/softwarecombine
- agent/references
- agent/weakness
- agent/description
- agent/event
- agent/first-publish-date
- collector/mitre-cve
- source/MITRE
- agent/last-modified-date
- agent/severity
- agent/source
- agent/tags
- collector/nvd-api
- source/NVD
- agent/software-canonical-lookup
- agent/software-canonical-lookup-request
- collector/nvd-historical
- collector/nvd-index
- vendor/microsoft
- canonical/microsoft windows 7
- version/microsoft windows 7/sp1
- canonical/microsoft windows server 2008 itanium
- version/microsoft windows server 2008 itanium/sp2
- version/microsoft windows server 2008 itanium/r2
- canonical/microsoft windows vista
- version/microsoft windows vista/sp2
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203