The TCP implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to cause a denial of service (non-paged pool memory consumption and system hang) via malformed data in the Options field of a TCP header, aka TCP Denial of Service Vulnerability.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Windows_7 | Microsoft | –sp1 (including) | –sp1 (including) |
Windows_8 | Microsoft | - (including) | - (including) |
Windows_8.1 | Microsoft | - (including) | - (including) |
Windows_rt | Microsoft | - (including) | - (including) |
Windows_rt_8.1 | Microsoft | - (including) | - (including) |
Windows_server_2008 | Microsoft | –sp2 (including) | –sp2 (including) |
Windows_server_2008 | Microsoft | r2-sp1 (including) | r2-sp1 (including) |
Windows_server_2012 | Microsoft | - (including) | - (including) |
Windows_server_2012 | Microsoft | r2 (including) | r2 (including) |
Windows_vista | Microsoft | –sp2 (including) | –sp2 (including) |