Microsoft Windows NetBIOS NULL Source Name Remote DoS

high Nessus Plugin ID 10392

Synopsis

The remote application is prone to denial of service attacks.

Description

The remote host appears to be running Microsoft Windows 95/98

The version of Windows installed on the remote host is vulnerable to the 'winpopups' or 'rfparalyze' denial of service. A user can leverage this issue to crash the remote host.

Note that Nessus crashed the remote host to test this flaw.

Solution

No patch available. Filter incoming traffic to this port.

See Also

https://seclists.org/bugtraq/2000/May/23

Plugin Details

Severity: High

ID: 10392

File Name: rfparalyze.nasl

Version: 1.30

Type: remote

Agent: windows

Family: Windows

Published: 5/3/2000

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

Required KB Items: SMB/name, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 5/11/2000

Reference Information

CVE: CVE-2000-0347

BID: 1163