CVE-2011-2013
08.11.2011, 21:55
Integer overflow in the TCP/IP implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code by sending a sequence of crafted UDP packets to a closed port, aka "Reference Counter Overflow Vulnerability."Enginsight
Vendor | Product | Version |
---|---|---|
microsoft | windows_7 | - |
microsoft | windows_7 | - |
microsoft | windows_7 | - |
microsoft | windows_server_2008 | * |
microsoft | windows_server_2008 | * |
microsoft | windows_server_2008 | - |
microsoft | windows_vista | * |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-189 -
- CWE-190 - Integer Overflow or WraparoundThe software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
References