Microsoft Windows 2000 Remote CPU-overload Vulnerability
BID:1415
Info
Microsoft Windows 2000 Remote CPU-overload Vulnerability
| Bugtraq ID: | 1415 |
| Class: | Failure to Handle Exceptional Conditions |
| CVE: |
CVE-2000-0580 |
| Remote: | Yes |
| Local: | Yes |
| Published: | Jun 30 2000 12:00AM |
| Updated: | Jul 11 2009 02:56AM |
| Credit: | Posted to BugTraq on June 30, 2000 in an advisory by SecureXpert Labs, in which the following individuals are credited: Mike Murray, Max Degtyar, and Richard Reiner, all of SecureXpert Labs. |
| Vulnerable: |
Microsoft Windows 2000 Server Microsoft Windows 2000 Professional Microsoft Windows 2000 Advanced Server |
| Not Vulnerable: | |
Discussion
Microsoft Windows 2000 Remote CPU-overload Vulnerability
Sending a stream of binary zeros to any one of a number of Windows 2000 ports can cause 100% CPU utilization. The ports that were found vulnerable include TCP ports 7, 9, 21, 23, 7778 and UDP ports 53, 67, 68, 135, 137, 500, 1812, 1813, 2535, 3456.
Sending a stream of binary zeros to any one of a number of Windows 2000 ports can cause 100% CPU utilization. The ports that were found vulnerable include TCP ports 7, 9, 21, 23, 7778 and UDP ports 53, 67, 68, 135, 137, 500, 1812, 1813, 2535, 3456.
Exploit / POC
Microsoft Windows 2000 Remote CPU-overload Vulnerability
From the SecureXpert advisory:
This can easily be reproduced from a Linux system using netcat with an input of /dev/zero, with a command such as "nc target.host 7 < /dev/zero" for the TCP variant or "nc -u target.host 53 < /dev/zero" for the UDP variant.
From the SecureXpert advisory:
This can easily be reproduced from a Linux system using netcat with an input of /dev/zero, with a command such as "nc target.host 7 < /dev/zero" for the TCP variant or "nc -u target.host 53 < /dev/zero" for the UDP variant.
Solution / Fix
Microsoft Windows 2000 Remote CPU-overload Vulnerability
Solution:
Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
Solution:
Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
References
Microsoft Windows 2000 Remote CPU-overload Vulnerability
References:
References: