A vulnerability in Microsoft Windows may allow a remote attacker to cause a denial of service.
Microsoft Windows XP SP2 and Windows Server 2003 are vulnerable to a denial-of-service attack via a crafted TCP packet. The packet is spoofed in a manner such that the source and destination IP addresses are the same, the source and destination ports are the same, and the SYN flag is set. This type of attack is known as a LAND attack.
Upon receiving such a packet, Windows may become unresponsive for several seconds.
By sending a specially crafted TCP packet to a Windows machine, an attacker could cause excessive CPU usage on the target system. Repeated exploitation of this vulnerability could result in a sustained denial-of-service condition.
Apply a patch
This vulnerability was publicly disclosed by Dejan Levaja.
This document was written by Will Dormann.
|Date First Published:||2005-04-13|
|Date Last Updated:||2005-04-13 17:20 UTC|