CVE-1999-0805
CVSS5.0
发布时间 :2001-03-12 00:00:00
修订时间 :2008-09-05 16:18:01
NMCOS    

[原文]Novell NetWare Transaction Tracking System (TTS) in Novell 4.11 and earlier allows remote attackers to cause a denial of service via a large number of requests.


[CNNVD]Netware 4.x事务跟踪系统漏洞(CNNVD-200103-042)

        Novell 4.11以及之前版本Novell NetWare Transaction Tracking System (TTS)存在漏洞。远程攻击者借助大量请求导致服务拒绝。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0805
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0805
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200103-042
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/static/2184.php
(VENDOR_ADVISORY)  XF  novell-tts-dos
http://archives.neohapsis.com/archives/bugtraq/1999_2/0439.html
(VENDOR_ADVISORY)  BUGTRAQ  19990512 DoS with Netware 4.x's TTS

- 漏洞信息

Netware 4.x事务跟踪系统漏洞
中危 边界条件错误
2001-03-12 00:00:00 2005-10-20 00:00:00
远程  
        Novell 4.11以及之前版本Novell NetWare Transaction Tracking System (TTS)存在漏洞。远程攻击者借助大量请求导致服务拒绝。

- 公告与补丁

        Apply the latest Netware 4.x Service Pack or upgrade to Netware 5. Alternatively you can add more memory to the servers or limit the number of transactons tracker at a given time. Using servman, or the command line on the server, SET MAXIMUM TRANSACTIONS = 5000. (If using the command line, insert the line into the autoexec.ncf.) This will tell the system to track less transactions, thus using less memory.

- 漏洞信息

9989
Novell NetWare Transaction Tracking System (TTS) DoS
Denial of Service
Loss of Availability

- 漏洞描述

Unknown or Incomplete

- 时间线

1999-05-12 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Netware 4.x Transaction Tracking System Vulnerability
Boundary Condition Error 276
Yes No
1999-05-12 12:00:00 2009-07-11 12:16:00
The vulnerability was discovered by <divebc@hotmail.com>. The vulnerability was published by Simple Nomad <thegnome@nmrc.org> of Nomad Mobile Research Center.

- 受影响的程序版本

Novell Netware 4.11 SP5B
Novell Netware 4.1

- 漏洞讨论

A vulnerability in Netware's Transaction Tracking System (TTS) may allow attackers to crash multiple servers.

The Transaction Tracking System (TTS) is a service provided by Netware to help preserve the integrity of data during a system crash. If a transaction is in the process of being written to the disk when the system crash, upon reboot the partial transaction will be backed out thus preserving the integrity of the data.

TTS by default tracks 10,00 transactions. If a high enough burst of transactions are sent to the server and the available memory is exhausted, TTS will become disabled. While TTS is disabled, no updates can be made to the Netware Disctory Services. This impacts any programs that update NDS, such as login. In extreme cases of very large simultaneous transactions that server may crash. If other servers contain NDS replicaes they may crash as well.

If a normal user has the ability to create a container and add objects to it he can create a large enough number of NDS updates quickly to crash the server by creating a container, dropping a few hundred objects into the it via drag-and-drog and then deleting the container.

- 漏洞利用

Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 解决方案

Apply the latest Netware 4.x Service Pack or upgrade to Netware 5. Alternatively you can add more memory to the servers or limit the number of transactons tracker at a given time. Using servman, or the command line on the server, SET MAXIMUM TRANSACTIONS = 5000. (If using the command line, insert the line into the autoexec.ncf.) This will tell the system to track less transactions, thus using less memory.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站