ID |
CVE-2013-3138
|
Summary |
Integer overflow in the TCP/IP kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows remote attackers to cause a denial of service (system hang) via crafted TCP packets, aka "TCP/IP Integer Overflow Vulnerability." |
References |
|
Vulnerable Configurations |
-
cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_8:-:-:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8:-:-:x64:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_8:-:-:x86:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8:-:-:x86:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_vista:*:sp2:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:sp2:x64:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
|
CVSS |
Base: | 7.1 (as of 28-09-2020 - 12:58) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-189 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
MEDIUM |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
NONE |
NONE |
COMPLETE |
|
cvss-vector
via4
|
AV:N/AC:M/Au:N/C:N/I:N/A:C
|
msbulletin
via4
|
bulletin_id | MS13-049 | bulletin_url | | date | 2013-06-11T00:00:00 | impact | Denial of Service | knowledgebase_id | 2845690 | knowledgebase_url | | severity | Important | title | Vulnerability in Kernel-Mode Driver Could Allow Denial of Service |
|
oval
via4
|
accepted | 2013-07-22T04:01:56.969-04:00 | class | vulnerability | contributors | name | SecPod Team | organization | SecPod Technologies |
| definition_extensions | comment | Microsoft Windows Vista (32-bit) Service Pack 2 is installed | oval | oval:org.mitre.oval:def:6124 |
comment | Microsoft Windows Vista x64 Edition Service Pack 2 is installed | oval | oval:org.mitre.oval:def:5594 |
comment | Microsoft Windows Server 2008 (32-bit) Service Pack 2 is installed | oval | oval:org.mitre.oval:def:5653 |
comment | Microsoft Windows Server 2008 x64 Edition Service Pack 2 is installed | oval | oval:org.mitre.oval:def:6216 |
comment | Microsoft Windows Server 2008 Itanium-Based Edition Service Pack 2 is installed | oval | oval:org.mitre.oval:def:6150 |
comment | Microsoft Windows 7 (32-bit) Service Pack 1 is installed | oval | oval:org.mitre.oval:def:12292 |
comment | Microsoft Windows 7 x64 Service Pack 1 is installed | oval | oval:org.mitre.oval:def:12627 |
comment | Microsoft Windows Server 2008 R2 x64 Service Pack 1 is installed | oval | oval:org.mitre.oval:def:12567 |
comment | Microsoft Windows Server 2008 R2 Itanium-Based Edition Service Pack 1 is installed | oval | oval:org.mitre.oval:def:12583 |
comment | Microsoft Windows 8 is installed | oval | oval:org.mitre.oval:def:15732 |
comment | Microsoft Windows Server 2012 is installed | oval | oval:org.mitre.oval:def:16359 |
| description | Integer overflow in the TCP/IP kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows remote attackers to cause a denial of service (system hang) via crafted TCP packets, aka "TCP/IP Integer Overflow Vulnerability." | family | windows | id | oval:org.mitre.oval:def:16943 | status | accepted | submitted | 2013-06-13T20:21:09 | title | Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - MS13-049 | version | 46 |
|
refmap
via4
|
|
Last major update |
28-09-2020 - 12:58 |
Published |
12-06-2013 - 03:30 |
Last modified |
28-09-2020 - 12:58 |