Check Point Reference: | CPAI-2013-2521 |
Date Published: | 13 Aug 2013 |
Severity: | High |
Last Updated: | Monday 06 January, 2025 |
Source: | CVE-2013-3183 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems Service Pack 1 Windows 7 for x64-based Systems Service Pack 1 Windows Server 2008 R2 Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1 Windows 8 for 32-bit Systems Windows 8 for 64-bit Systems Windows Server 2012 Windows Server 2012 Windows RT Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2012 (Server Core installation) |
Vulnerability Description | There exists a denial of service vulnerability in Windows TCP/IP stack. |
Update/Patch Avaliable | Apply patches from: MS13-065 |
Vulnerability Details | The vulnerability is caused when the Windows TCP/IP stack improperly handles memory allocation while processing specially crafted ICMPv6 packets. An unauthenticated attacker who successfully exploited this vulnerability could cause the target system to stop responding until restarted. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your product to the latest update. For information on how to update , go to SBP-2006-05, Protection tab and select the version of your choice.
SmartView Tracker will log the following entries:
Attack Name: VoIP Enforcement Violation
Attack Information: Microsoft Windows ICMPv6 Router Advertisement Denial of Service (MS13-065)