📄 275.txt
字号:
Rule:--Sid:275--Summary:This event is generated when a remote attacker transmits a malformed TCP packet to an internal server. This may indicate a "NAPTHA" Denial of Service (DoS) attack.--Impact:Denial of service.--Detailed Information:An attacker can craft a TCP packet that, when transmitted to the target server, maintains the TCP session on the target server in an unresolved state. This consumes system resources and overwhelms the target server, causing the server to stop responding to other network requests. In some cases, this type of attack can crash the target server. --Affected Systems:Microsoft Windows 95Microsoft Windows 98Microsoft Windows 98SEMicrosoft Windows MillenniumWindows NT 4.0HP-UX 11IBM AIX 4.3Sun Solaris 7-8FreeBSD 4.0-RELRedhat Linux 6.1 - 7.0Other Linux operating systems based on the Linux 2.0 kernel--Attack Scenarios:An attacker sends a number of malformed TCP packets to a target computer. The computer attempts to maintain all incoming connections, causing it to slow down or stop responding to legitimate network requests.--Ease of Attack:Simple. Exploits exist.--False Positives:None known.--False Negatives:None known.--Corrective Action:Install the latest patches available for your operating system. Patches and workarounds for Microsoft are available at http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS00-091.asp.--Contributors:Original rule writer unknownSourcefire Research TeamSourcefire Technical Publications TeamJen Harvey <jennifer.harvey@sourcefire.com>--Additional References:--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -