CVE-2000-1039
CVSS5.0
发布时间 :2001-01-09 00:00:00
修订时间 :2008-09-05 16:22:30
NMCOS    

[原文]Various TCP/IP stacks and network applications allow remote attackers to cause a denial of service by flooding a target host with TCP connection attempts and completing the TCP/IP handshake without maintaining the connection state on the attacker host, aka the "NAPTHA" class of vulnerabilities. NOTE: this candidate may change significantly as the security community discusses the technical nature of NAPTHA and learns more about the affected applications. This candidate is at a higher level of abstraction than is typical for CVE.


[CNNVD]多个供应商TCP/IP资源耗尽漏洞(CNNVD-200101-113)

        各种TCP/IP堆以及网络应用存在漏洞。远程攻击者可以通过伪造带有TCP连接尝试的目标主机以及完成不维持攻击者主机连接状态的TCP/IP握手来导致服务拒绝,该漏洞也称为"NAPTHA" 级别漏洞。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:microsoft:windows_95Microsoft Windows 95
cpe:/o:microsoft:windows_meMicrosoft Windows ME
cpe:/o:microsoft:windows_98::goldMicrosoft windows 98_gold
cpe:/o:microsoft:windows_nt:4.0Microsoft Windows NT 4.0
cpe:/o:microsoft:windows_98seMicrosoft windows 98_se

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1039
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-1039
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200101-113
(官方数据源) CNNVD

- 其它链接及资源

http://www.cert.org/advisories/CA-2000-21.html
(VENDOR_ADVISORY)  CERT  CA-2000-21
http://www.securityfocus.com/bid/2022
(VENDOR_ADVISORY)  BID  2022
http://www.microsoft.com/technet/security/bulletin/MS00-091.asp
(VENDOR_ADVISORY)  MS  MS00-091
http://razor.bindview.com/publish/advisories/adv_NAPTHA.html
(UNKNOWN)  BINDVIEW  20001130 The NAPTHA DoS vulnerabilities
http://archives.neohapsis.com/archives/win2ksecadvice/2000-q4/0105.html
(UNKNOWN)  WIN2KSEC  20001204 NAPTHA Advisory Updated - BindView RAZOR

- 漏洞信息

多个供应商TCP/IP资源耗尽漏洞
中危 其他
2001-01-09 00:00:00 2005-10-20 00:00:00
远程  
        各种TCP/IP堆以及网络应用存在漏洞。远程攻击者可以通过伪造带有TCP连接尝试的目标主机以及完成不维持攻击者主机连接状态的TCP/IP握手来导致服务拒绝,该漏洞也称为"NAPTHA" 级别漏洞。

- 公告与补丁

        Microsoft has released a patch for Windows NT 4.0. For those running Windows 95/98/ME, Microsoft recommends to disable File and Printer Sharing which is detailed in the following knowledge base article:
        http://www.microsoft.com/technet/support/kb.asp?ID=199346

- 漏洞信息

462
Multiple Vendor Crafted TCP/IP Packet DoS (NAPTHA)
Remote / Network Access Denial of Service
Loss of Availability

- 漏洞描述

Unknown or Incomplete

- 时间线

2000-11-30 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Multiple Vendor TCP/IP Resource Exhaustion Vulnerability
Failure to Handle Exceptional Conditions 2022
Yes No
2000-11-30 12:00:00 2009-07-11 03:56:00
Discovered by the BindView Razor Team <info@razor.bindview.com> and first publicized in a Microsoft Security Bulletin (MS00-091) on November 30, 2000.

- 受影响的程序版本

Microsoft Windows NT Workstation 4.0 SP6a
Microsoft Windows NT Workstation 4.0 SP6
Microsoft Windows NT Workstation 4.0 SP5
Microsoft Windows NT Workstation 4.0 SP4
Microsoft Windows NT Workstation 4.0 SP3
Microsoft Windows NT Workstation 4.0 SP2
Microsoft Windows NT Workstation 4.0 SP1
Microsoft Windows NT Workstation 4.0
Microsoft Windows NT Terminal Server 4.0 SP6
Microsoft Windows NT Terminal Server 4.0 SP5
Microsoft Windows NT Terminal Server 4.0 SP4
Microsoft Windows NT Terminal Server 4.0 SP3
Microsoft Windows NT Terminal Server 4.0 SP2
Microsoft Windows NT Terminal Server 4.0 SP1
Microsoft Windows NT Terminal Server 4.0
Microsoft Windows NT Server 4.0 SP6a
+ Avaya DefinityOne Media Servers
+ Avaya DefinityOne Media Servers
+ Avaya IP600 Media Servers
+ Avaya IP600 Media Servers
+ Avaya S3400 Message Application Server 0
+ Avaya S8100 Media Servers 0
+ Avaya S8100 Media Servers 0
Microsoft Windows NT Server 4.0 SP6
Microsoft Windows NT Server 4.0 SP5
Microsoft Windows NT Server 4.0 SP4
Microsoft Windows NT Server 4.0 SP3
Microsoft Windows NT Server 4.0 SP2
Microsoft Windows NT Server 4.0 SP1
Microsoft Windows NT Server 4.0
Microsoft Windows NT Enterprise Server 4.0 SP6a
Microsoft Windows NT Enterprise Server 4.0 SP6
Microsoft Windows NT Enterprise Server 4.0 SP5
Microsoft Windows NT Enterprise Server 4.0 SP4
Microsoft Windows NT Enterprise Server 4.0 SP3
Microsoft Windows NT Enterprise Server 4.0 SP2
Microsoft Windows NT Enterprise Server 4.0 SP1
Microsoft Windows NT Enterprise Server 4.0
Microsoft Windows NT 4.0
+ Microsoft Windows NT Enterprise Server 4.0
+ Microsoft Windows NT Enterprise Server 4.0
+ Microsoft Windows NT Server 4.0
+ Microsoft Windows NT Server 4.0
+ Microsoft Windows NT Terminal Server 4.0
+ Microsoft Windows NT Terminal Server 4.0
+ Microsoft Windows NT Workstation 4.0
+ Microsoft Windows NT Workstation 4.0
Microsoft Windows ME
Microsoft Windows 98SE
Microsoft Windows 98
Microsoft Windows 95
Microsoft Windows 2000 Server SP2
Microsoft Windows 2000 Server SP1
Microsoft Windows 2000 Server
+ Avaya DefinityOne Media Servers
+ Avaya IP600 Media Servers
+ Avaya S3400 Message Application Server 0
+ Avaya S8100 Media Servers 0
Microsoft Windows 2000 Professional SP2
Microsoft Windows 2000 Professional SP1
Microsoft Windows 2000 Professional
Microsoft Windows 2000 Datacenter Server SP2
Microsoft Windows 2000 Datacenter Server SP1
Microsoft Windows 2000 Datacenter Server
Microsoft Windows 2000 Advanced Server SP2
Microsoft Windows 2000 Advanced Server SP1
Microsoft Windows 2000 Advanced Server

- 不受影响的程序版本

Microsoft Windows 2000 Server SP2
Microsoft Windows 2000 Server SP1
Microsoft Windows 2000 Server
+ Avaya DefinityOne Media Servers
+ Avaya IP600 Media Servers
+ Avaya S3400 Message Application Server 0
+ Avaya S8100 Media Servers 0
Microsoft Windows 2000 Professional SP2
Microsoft Windows 2000 Professional SP1
Microsoft Windows 2000 Professional
Microsoft Windows 2000 Datacenter Server SP2
Microsoft Windows 2000 Datacenter Server SP1
Microsoft Windows 2000 Datacenter Server
Microsoft Windows 2000 Advanced Server SP2
Microsoft Windows 2000 Advanced Server SP1
Microsoft Windows 2000 Advanced Server

- 漏洞讨论

Microsoft's implementation NetBIOS is vulnerable to a remotely exploitable denial of service attack. An attacker who has access to the NBT port can cause the system to become exhausted of network resources and cease functioning.

The attack is carried out by initiating many connections and then closing them, leaving the target tcp sockets in FINWAIT_1 state. Although the sockets will eventually time out and be freed, an attacker can continuously send more, initiating and closing new connections using up any freed network resources. The result may be a denial of useful NetBIOS services until the attack stops.

This type of attack is well known as simple resource exhaustion, but has become an issue with new tools that enable attackers to launch more effective resource exhaustion attacks. Microsoft has released fixes to patch this vulnerability in NT 4.0sp6. This vulnerability affects many operating systems aside from Microsoft Windows, however Microsoft is the only vendor thus far to issue a patch and workaround.

- 漏洞利用

For Windows 9x/ME/NT 4.0, leave a large number of connections in FINWAIT_1 state.

Exploitation may vary depending on the operating system of a targetted host.

- 解决方案

Microsoft has released a patch for Windows NT 4.0. For those running Windows 95/98/ME, Microsoft recommends to disable File and Printer Sharing which is detailed in the following knowledge base article:

http://www.microsoft.com/technet/support/kb.asp?ID=199346

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站