NA

CVE-2023-29363

Published: 14/06/2023 Updated: 20/06/2023
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

This vulnerability allows network-adjacent malicious users to create a denial-of-service condition on affected installations of Microsoft Windows. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the Pragmatic General Multicast protocol. The issue results from the lack of proper validation of the Transmission Group Size field, which can result in corruption of an in-memory structure. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows server 2008 r2

microsoft windows server 2012 r2

microsoft windows server 2016 -

microsoft windows server 2012 -

microsoft windows server 2008 -

microsoft windows server 2019 -

microsoft windows server 2022 -

microsoft windows 10 21h2

microsoft windows 10 22h2

microsoft windows 11 21h2

microsoft windows 11 22h2

microsoft windows 10 1809

microsoft windows 10 1607

microsoft windows 10 1507

Recent Articles

June Patch Tuesday: VMware vuln under attack by Chinese spies, Microsoft kinda meh
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Plus: Adobe, SAP and Android push updates

Microsoft has released security updates for 78 flaws for June's Patch Tuesday, and luckily for admins, none of these are under exploit. Yesterday's critical Fortinet bug and the ongoing Progress MOVEit flaws, however, are entirely different stories, so the proverbial thoughts and prayers to the teams dealing with those messes.  Microsoft's big patch day rated six of today's fixes as critical and four of these garnered a 9.8 severity score, so let's start with those. CVE-2023-29357, a Micros...