Denial of service vulnerability in Windows TCP/IP stack when URL-based Quality of Service (QoS) is enabledID: oval:org.secpod.oval:def:1743 | Date: (C)2011-08-10 (M)2022-03-15 |
Class: VULNERABILITY | Family: windows |
The host is installed with Windows Vista, Windows Server 2008, Windows Server 2008 R2, Windows Server 2008 R2 SP1, Windows 7 or Windows 7 SP1 and is prone to a denial of service vulnerability. A flaw is present in the application, as it fails to handle URL's in memory when URL-based Quality of Service (QoS) is enabled. Successful exploitation could allow an attacker to crash the service.
Platform: |
Microsoft Windows 7 |
Microsoft Windows Server 2008 R2 |