[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Denial of service vulnerability in Windows TCP/IP stack when URL-based Quality of Service (QoS) is enabled

ID: oval:org.secpod.oval:def:1743Date: (C)2011-08-10   (M)2022-03-15
Class: VULNERABILITYFamily: windows




The host is installed with Windows Vista, Windows Server 2008, Windows Server 2008 R2, Windows Server 2008 R2 SP1, Windows 7 or Windows 7 SP1 and is prone to a denial of service vulnerability. A flaw is present in the application, as it fails to handle URL's in memory when URL-based Quality of Service (QoS) is enabled. Successful exploitation could allow an attacker to crash the service.

Platform:
Microsoft Windows 7
Microsoft Windows Server 2008 R2
Reference:
CVE-2011-1965
CVE    1
CVE-2011-1965
CPE    13
cpe:/o:microsoft:windows_server_2008:r2:sp1:x64
cpe:/o:microsoft:windows_7:::x64
cpe:/o:microsoft:windows_7:::x86
cpe:/o:microsoft:windows_server_2008:r2:sp1:itanium
...

© SecPod Technologies