CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
96.4%
Integer overflow in the TCP/IP implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code by sending a sequence of crafted UDP packets to a closed port, aka “Reference Counter Overflow Vulnerability.”
Vendor | Product | Version | CPE |
---|---|---|---|
microsoft | windows_7 | - | cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:* |
microsoft | windows_7 | - | cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:* |
microsoft | windows_7 | - | cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:* |
microsoft | windows_server_2008 | * | cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:* |
microsoft | windows_server_2008 | * | cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:* |
microsoft | windows_server_2008 | - | cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:* |
microsoft | windows_server_2008 | r2 | cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:* |
microsoft | windows_server_2008 | r2 | cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:* |
microsoft | windows_vista | * | cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:* |