Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2011-2013 — Integer Overflow or Wraparound in Microsoft Windows Server 2008
CWE-189CWE-190 — Integer Overflow or WraparoundCWE-377 — Insecure Temporary File34 documents9 sources
Severity
9.8CRITICALNVD
EPSS
42.8%
top 2.51%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedNov 8
Latest updateMay 13
Description
Integer overflow in the TCP/IP implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code by sending a sequence of crafted UDP packets to a closed port, aka "Reference Counter Overflow Vulnerability."
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages2 packages
🔴Vulnerability Details
1GHSA▶
GHSA-q323-hhw8-233j: Integer overflow in the TCP/IP implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allo↗2022-05-13
💥Exploits & PoCs
14Exploit-DB
▶
📋Vendor Advisories
4💬Community
11Bugzilla
▶