{"vuid":"VU#396645","idnumber":"396645","name":"Microsoft Windows vulnerable to DoS via LAND attack","keywords":["Microsoft","Windows","DoS","Denial of Service","LAND Attack","syn","SP2","ms06-oct"],"overview":"A vulnerability in Microsoft Windows may allow a remote attacker to cause a denial of service.","clean_desc":"Microsoft Windows XP SP2 and Windows Server 2003 are vulnerable to a denial-of-service attack via a crafted TCP packet. The packet is spoofed in a manner such that the source and destination IP addresses are the same, the source and destination ports are the same, and the SYN flag is set. This type of attack is known as a LAND attack. Upon receiving such a packet, Windows may become unresponsive for several seconds.","impact":"By sending a specially crafted TCP packet to a Windows machine, an attacker could cause excessive CPU usage on the target system. Repeated exploitation of this vulnerability could result in a sustained denial-of-service condition.","resolution":"Apply a patch\nApply a patch as described in Microsoft Security Bulletin MS05-019.","workarounds":"Filter network traffic Network firewalls, intrusion detection and prevention systems, and packet filtering technology may be able to detect and block LAND attacks. If a perimeter network device is configured to drop incoming packets with source IP addresses that match addresses within the network, a remote attacker may not be able to exploit this vulnerability.","sysaffected":"","thanks":"This vulnerability was publicly disclosed by Dejan Levaja.","author":"This document was written by Will Dormann.","public":["http://www.microsoft.com/technet/security/bulletin/ms05-019.mspx","http://secunia.com/advisories/14512","http://www.securityfocus.com/bid/2666","http://xforce.iss.net/xforce/xfdb/19593","http://osvdb.org/displayvuln.php?osvdb_id=14578"],"cveids":["CVE-2005-0688"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-03-07T20:15:56Z","publicdate":"2005-03-05T00:00:00Z","datefirstpublished":"2005-04-13T17:19:20Z","dateupdated":"2005-04-13T17:20:29Z","revision":22,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"18","cam_impact":"3","cam_easeofexploitation":"20","cam_attackeraccessrequired":"20","cam_scorecurrent":"12.15","cam_scorecurrentwidelyknown":"12.15","cam_scorecurrentwidelyknownexploited":"20.25","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":12.15,"vulnote":null}