Description
The TCP/IP implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows remote attackers to cause a denial of service (reboot) via a crafted packet that terminates a TCP connection, aka "TCP FIN WAIT Vulnerability."
Published: 2013-02-13
Score: 7.8 High
EPSS: 81.5% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 17 Oct 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Microsoft Windows 7 Windows 8 Windows Rt Windows Server 2008 Windows Server 2012 Windows Vista
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2024-10-17T18:18:12.016Z

Reserved: 2012-11-27T00:00:00.000Z

Link: CVE-2013-0075

cve-icon Vulnrichment

Updated: 2024-08-06T14:10:56.656Z

cve-icon NVD

Status : Deferred

Published: 2013-02-13T12:04:12.320

Modified: 2025-04-11T00:51:21.963

Link: CVE-2013-0075

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses