Lucene search

K
certDejan LevajaVU:396645
HistoryApr 13, 2005 - 12:00 a.m.

Microsoft Windows vulnerable to DoS via LAND attack

2005-04-1300:00:00
Dejan Levaja
www.kb.cert.org
27

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.078 Low

EPSS

Percentile

94.3%

Overview

A vulnerability in Microsoft Windows may allow a remote attacker to cause a denial of service.

Description

Microsoft Windows XP SP2 and Windows Server 2003 are vulnerable to a denial-of-service attack via a crafted TCP packet. The packet is spoofed in a manner such that the source and destination IP addresses are the same, the source and destination ports are the same, and the SYN flag is set. This type of attack is known as a LAND attack.

Upon receiving such a packet, Windows may become unresponsive for several seconds.


Impact

By sending a specially crafted TCP packet to a Windows machine, an attacker could cause excessive CPU usage on the target system. Repeated exploitation of this vulnerability could result in a sustained denial-of-service condition.


Solution

Apply a patch
Apply a patch as described in Microsoft Security Bulletin MS05-019.


Filter Network Traffic

Network firewall, Intrusion Detection and Prevention Systems, and packet filtering technology may be able to detect and block LAND attacks. If a perimeter network device is configured to drop incoming packets with source IP addresses that match addresses within the network, a remote attacker may not be able to exploit this vulnerability.


Vendor Information

396645

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Microsoft Corporation __ Affected

Notified: March 09, 2005 Updated: March 23, 2005

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

US-CERT has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23396645 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was publicly disclosed by Dejan Levaja.

This document was written by Will Dormann.

Other Information

CVE IDs: CVE-2005-0688
Severity Metric: 12.15 Date Public:

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.078 Low

EPSS

Percentile

94.3%