TCP/IP IP Fragmentation Remote DoS (bonk)

high Nessus Plugin ID 10030

Synopsis

The operating system on the remote host has a denial of service vulnerability.

Description

It was possible to make the remote server crash using the 'bonk' attack. This is due to a design flaw in the remote operating system's TCP/IP implementation.

An attacker may use this flaw to shut down this server, thus preventing the network from working properly.

Solution

Contact the operating system vendor for a patch.

See Also

https://marc.info/?l=bugtraq&m=88429524325956&w=2

Plugin Details

Severity: High

ID: 10030

File Name: bonk.nasl

Version: 1.38

Type: remote

Published: 6/22/1999

Updated: 3/6/2019

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: High

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows_95, cpe:/o:microsoft:windows_nt

Required KB Items: Settings/ParanoidReport

Vulnerability Publication Date: 1/8/1998

Reference Information

CVE: CVE-1999-0258