Microsoft Windows NT RPC DoS Vulnerability
Windows NT is subject to a denial of service. If a forged packet containing a false source address and source port is sent to a target NT machine on UDP port 135, the target will reply to the false address and source port. The mistaken machine will reply with a rejection and hence the loop begins. This can and will eventually consume massive amounts of processor resource and bandwidth if allowed to go on unchecked. |
|
Privacy Statement |