Integer overflow vulnerability in the TCP/IP implementation in Windows TCP/IP stack aka "Reference Counter Overflow Vulnerability."ID: oval:org.secpod.oval:def:2720 | Date: (C)2011-11-09 (M)2023-12-14 |
Class: VULNERABILITY | Family: windows |
The host is installed with Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, or R2 SP1, or Windows 7 base or SP1 and is prone to an integer overflow vulnerability. A flaw is present in the applications, which fail to handle the processing of a continuous flow of specially crafted UDP packets. Successful exploitation could allow attackers to execute arbitrary code in the kernel mode.
Platform: |
Microsoft Windows 7 |
Microsoft Windows Server 2008 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows Vista |