[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

Integer overflow vulnerability in the TCP/IP implementation in Windows TCP/IP stack aka "Reference Counter Overflow Vulnerability."

ID: oval:org.secpod.oval:def:2720Date: (C)2011-11-09   (M)2023-12-14
Class: VULNERABILITYFamily: windows




The host is installed with Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, or R2 SP1, or Windows 7 base or SP1 and is prone to an integer overflow vulnerability. A flaw is present in the applications, which fail to handle the processing of a continuous flow of specially crafted UDP packets. Successful exploitation could allow attackers to execute arbitrary code in the kernel mode.

Platform:
Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Reference:
CVE-2011-2013
CVE    1
CVE-2011-2013
CPE    21
cpe:/o:microsoft:windows_server_2008:r2:sp1:x64
cpe:/o:microsoft:windows_7::sp1:x64
cpe:/o:microsoft:windows_7::sp1:x86
cpe:/o:microsoft:windows_vista::sp2:x64
...

© SecPod Technologies