CVE-2000-0580
CVSS5.0
发布时间 :2000-06-30 00:00:00
修订时间 :2008-09-10 15:05:04
NMCOES    

[原文]Windows 2000 Server allows remote attackers to cause a denial of service by sending a continuous stream of binary zeros to various TCP and UDP ports, which significantly increases the CPU utilization.


[CNNVD]Microsoft Windows 2000远程CPU超载漏洞(CNNVD-200006-115)

        Windows 2000 Server存在漏洞。远程攻击者通过发送连续的二进制0数据流到不同TCP和UDP端口,这导致CPU使用率大大增加。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:microsoft:windows_2000Microsoft Windows 2000
cpe:/o:microsoft:windows_2000:2000.0.2195
cpe:/o:microsoft:windows_2000:2000.2072

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0580
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-0580
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200006-115
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.3.96.1000630161935.4619B-100000@fjord.fscinternet.com
(VENDOR_ADVISORY)  BUGTRAQ  20000630 SecureXpert Advisory [SX-20000620-2]
http://www.securityfocus.com/bid/1415
(VENDOR_ADVISORY)  BID  1415

- 漏洞信息

Microsoft Windows 2000远程CPU超载漏洞
中危 其他
2000-06-30 00:00:00 2005-10-20 00:00:00
远程※本地  
        Windows 2000 Server存在漏洞。远程攻击者通过发送连续的二进制0数据流到不同TCP和UDP端口,这导致CPU使用率大大增加。

- 公告与补丁

        Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 漏洞信息 (20048)

Microsoft Windows 2000 Remote CPU-overload Vulnerability (EDBID:20048)
windows remote
2000-06-30 Verified
0 SecureXpert Labs
N/A [点击下载]
source: http://www.securityfocus.com/bid/1415/info

Sending a stream of binary zeros to any one of a number of Windows 2000 ports can cause 100% CPU utilization. The ports that were found vulnerable include TCP ports 7, 9, 21, 23, 7778 and UDP ports 53, 67, 68, 135, 137, 500, 1812, 1813, 2535, 3456. 

This can easily be reproduced from a Linux system using netcat with an input of /dev/zero, with a command such as "nc target.host 7 < /dev/zero" for the TCP variant or "nc -u target.host 53 < /dev/zero" for the UDP variant. 		

- 漏洞信息

59346
Microsoft Windows 2000 Crafted TCP/UDP Traffic CPU Consumption Remote DoS
Remote / Network Access Denial of Service, Input Manipulation
Loss of Availability Patch / RCS
Exploit Public Vendor Verified, Third-party Verified

- 漏洞描述

- 时间线

2000-06-30 Unknow
2000-06-30 Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Microsoft has released a patch to address this vulnerability. Check the vendor advisory or solution in the references section.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Microsoft Windows 2000 Remote CPU-overload Vulnerability
Failure to Handle Exceptional Conditions 1415
Yes Yes
2000-06-30 12:00:00 2009-07-11 02:56:00
Posted to BugTraq on June 30, 2000 in an advisory by SecureXpert Labs, in which the following individuals are credited: Mike Murray, Max Degtyar, and Richard Reiner, all of SecureXpert Labs.

- 受影响的程序版本

Microsoft Windows 2000 Server
+ Avaya DefinityOne Media Servers
+ Avaya IP600 Media Servers
+ Avaya S3400 Message Application Server 0
+ Avaya S8100 Media Servers 0
Microsoft Windows 2000 Professional
Microsoft Windows 2000 Advanced Server

- 漏洞讨论

Sending a stream of binary zeros to any one of a number of Windows 2000 ports can cause 100% CPU utilization. The ports that were found vulnerable include TCP ports 7, 9, 21, 23, 7778 and UDP ports 53, 67, 68, 135, 137, 500, 1812, 1813, 2535, 3456.

- 漏洞利用

From the SecureXpert advisory:
This can easily be reproduced from a Linux system using netcat with an input of /dev/zero, with a command such as "nc target.host 7 &lt; /dev/zero" for the TCP variant or "nc -u target.host 53 &lt; /dev/zero" for the UDP variant.

- 解决方案

Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站