TCP/IP ACK Packet Saturation Remote DoS (stream.c)

high Nessus Plugin ID 10271

Synopsis

The remote host is vulnerable to a denial of service.

Description

It seems it was possible to make the remote server crash using the 'stream' (or 'raped') attack.

An attacker may use this flaw to shut down this server, thus preventing your network from working properly.

Solution

Solution :

Contact your operating system vendor for a patch.

- If you use IP filter, then add these rules :

block in quick proto tcp from any to any head 100 pass in quick proto tcp from any to any flags S keep state group 100 pass in all

See Also

https://seclists.org/bugtraq/1999/Jul/247

Plugin Details

Severity: High

ID: 10271

File Name: stream.nasl

Version: 1.34

Type: remote

Published: 1/21/2000

Updated: 3/6/2019

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 7/29/1999

Reference Information

CVE: CVE-1999-0770

BID: 549