We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
The TCP/IP implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows remote attackers to cause a denial of service (reboot) via a crafted packet that terminates a TCP connection, aka "TCP FIN WAIT Vulnerability."
Reserved 2012-11-27 | Published 2013-02-13 | Updated 2024-10-17 | Assigner microsoftdocs.microsoft.com/...pdates/securitybulletins/2013/ms13-018 (MS13-018)
www.us-cert.gov/cas/techalerts/TA13-043B.html (TA13-043B)
oval.cisecurity.org/...inition/oval:org.mitre.oval:def:16373 (oval:org.mitre.oval:def:16373)
Support options