Rapid7 Vulnerability & Exploit Database

Microsoft CVE-2018-8206: Windows Firewall Denial of Service Vulnerability

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Microsoft CVE-2018-8206: Windows Firewall Denial of Service Vulnerability

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
07/10/2018
Created
07/25/2018
Added
07/10/2018
Modified
11/18/2021

Description

A denial of service vulnerability exists when Windows improperly handles File Transfer Protocol (FTP) connections. An attacker who successfully exploited the vulnerability could cause a target system to stop responding. To exploit the vulnerability, an unauthenticated attacker could send specially crafted packets to a Windows computer that is processing connections on TCP port 21. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to cause a target system to stop responding. The security update addresses the vulnerability by correcting how Windows handles FTP connections.

Solution(s)

  • msft-kb4293756-3ab26983-5dc5-46e9-8400-d850b0dc8832
  • msft-kb4293756-4636c6e6-d7de-4873-9fa2-2c6e96e39331
  • msft-kb4293756-98ba6bf8-c61b-4d58-8be6-e5cfc461f7b6
  • msft-kb4338814-1d730105-0adc-48b0-b97e-f99e48b0bc43
  • msft-kb4338814-3e8fbcc4-12ae-46d7-a550-98b36cf04be3
  • msft-kb4338814-c0b5b4ea-e32b-4bd3-8f5a-5d20c0d60b6c
  • msft-kb4338819-08527cb0-be58-4d15-8f32-45fb469e1e20
  • msft-kb4338819-9876f789-b78e-461c-aede-5719fef65c90
  • msft-kb4338819-a4a592f3-8cbf-465f-a51a-63e0e57ec72b
  • msft-kb4338820-42ded291-a440-4b4d-9efd-877384896802
  • msft-kb4338820-756f2788-66ec-4732-ab6d-10a889a37d64
  • msft-kb4338820-e053fade-ae8f-4e1b-a113-c319625bc13c
  • msft-kb4338823-350c8547-b462-47a7-9150-012b5e59cae5
  • msft-kb4338823-3c0a22dd-84e1-4d8d-bab0-9c1366320bb0
  • msft-kb4338823-aad98b57-eed4-4a0e-a44a-6ad82f339406
  • msft-kb4338823-b304c792-133a-4fa4-8f47-bac9153afd71
  • msft-kb4338823-b62a64f4-5072-4074-ac63-79ae61e0d4b0
  • msft-kb4338823-d5fa704a-bd09-4d9b-a68e-8da1fe2642f7
  • msft-kb4338824-007ce1f3-3a12-40ef-8389-322068b780a7
  • msft-kb4338824-4f051f3f-abd6-4d6d-8fbe-c78051dfe500
  • msft-kb4338824-5d49efb1-0497-4625-9504-474fceca16d8
  • msft-kb4338825-0839cfd6-8d2d-4902-86f9-c500c8c2012e
  • msft-kb4338825-b4d83549-b9d9-476e-a185-2cbcac3e6da5
  • msft-kb4338825-f09a0bc7-6651-458a-9781-7fc2aa78f77a
  • msft-kb4338826-5631f856-d323-46c6-9315-6009b1e15264
  • msft-kb4338826-68816a0f-47c2-40da-b3cd-f46bc468546e
  • msft-kb4338829-65462f35-2ae0-49e0-8271-65ae301cb886
  • msft-kb4338829-b156d204-e2b4-4f8a-baba-c2501be2b4c2

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;