First published: Wed Feb 13 2013(Updated: )
The TCP/IP implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows remote attackers to cause a denial of service (reboot) via a crafted packet that terminates a TCP connection, aka "TCP FIN WAIT Vulnerability."
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows 7 | ||
Microsoft Windows 7 | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows Server 2008 Itanium | =r2 | |
Microsoft Windows Server 2008 Itanium | =r2 | |
Microsoft Windows 8.0 | ||
Microsoft Windows 8.0 | ||
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows RT | ||
Microsoft Windows Vista | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0075 has a severity rating of Important, indicating a potential impact on system availability.
To fix CVE-2013-0075, apply the relevant security update or patch provided by Microsoft according to their guidance.
CVE-2013-0075 affects Microsoft Windows Vista SP2, Windows 7, Windows 8, Windows Server 2008 SP2, and Windows Server 2012 among others.
CVE-2013-0075 primarily causes a denial of service, which may lead to transient system unavailability but not direct data loss.
While the best practice is to apply updates, some users may mitigate the risk by configuring firewall rules to restrict incoming traffic.