Search: Home Bugtraq Vulnerabilities Mailing Lists Security Jobs Tools

Microsoft Windows NT RPC DoS Vulnerability

Windows NT is subject to a denial of service. If a forged packet containing a false source address and source port is sent to a target NT machine on UDP port 135, the target will reply to the false address and source port. The mistaken machine will reply with a rejection and hence the loop begins. This can and will eventually consume massive amounts of processor resource and bandwidth if allowed to go on unchecked.



 

Privacy Statement
Copyright 2005, SecurityFocus