Check Point Reference: | CPAI-2013-2521 |
Date Published: | 13 Aug 2013 |
Severity: | Critical |
Last Updated: | Monday 19 August, 2013 |
Source: | |
Industry Reference: | CVE-2013-3183 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | There exists a denial of service vulnerability in Windows TCP/IP stack. The vulnerability is caused when the Windows TCP/IP stack improperly handles memory allocation while processing specially crafted ICMPv6 packets. An unauthenticated attacker who successfully exploited this vulnerability could cause the target system to stop responding until restarted. |
This protection will detect and block attempts to exploit this vulnerability.Note: This protection is supported from version R76 and above and cannot be enforced by previous IPS gateway versions.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: ICMP Protocol Violation.
Attack Information: Microsoft Windows ICMPv6 Router Advertisement Denial of Service (MS13-065)