Vulnerability Note VU#396645

Microsoft Windows vulnerable to DoS via LAND attack

Original Release date: 13 Apr 2005 | Last revised: 13 Apr 2005

Overview

A vulnerability in Microsoft Windows may allow a remote attacker to cause a denial of service.

Description

Microsoft Windows XP SP2 and Windows Server 2003 are vulnerable to a denial-of-service attack via a crafted TCP packet. The packet is spoofed in a manner such that the source and destination IP addresses are the same, the source and destination ports are the same, and the SYN flag is set. This type of attack is known as a LAND attack.

Upon receiving such a packet, Windows may become unresponsive for several seconds.

Impact

By sending a specially crafted TCP packet to a Windows machine, an attacker could cause excessive CPU usage on the target system. Repeated exploitation of this vulnerability could result in a sustained denial-of-service condition.

Solution

Apply a patch
Apply a patch as described in Microsoft Security Bulletin MS05-019.


Filter Network Traffic

Network firewall, Intrusion Detection and Prevention Systems, and packet filtering technology may be able to detect and block LAND attacks. If a perimeter network device is configured to drop incoming packets with source IP addresses that match addresses within the network, a remote attacker may not be able to exploit this vulnerability.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected09 Mar 200523 Mar 2005
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This vulnerability was publicly disclosed by Dejan Levaja.

This document was written by Will Dormann.

Other Information

  • CVE IDs: CAN-2005-0688
  • Date Public: 05 Mar 2005
  • Date First Published: 13 Apr 2005
  • Date Last Updated: 13 Apr 2005
  • Severity Metric: 12.15
  • Document Revision: 14

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.