Windows SynAttackProtect Predictable Hash Remote DoS Vulnerability

Microsoft Windows is prone to a denial of service vulnerability.


The vulnerability arises due to a design error in the function responsible for the hash table management for ‘SynAttackProtect’. Reports indicate that the affected function used by the TCP/IP stack creates a predictable hash, allowing an attacker to send a large number of SYN packets with an identical hash value.


A successful attack can eventually lead to a denial of service condition due to the lookup algorithm becoming very inefficient at performing searches.


Vulnerable:  
Microsoft Windows Server 2003 Web Edition
Microsoft Windows Server 2003 Standard Edition
Microsoft Windows Server 2003 Enterprise Edition
Microsoft Windows Server 2003 Datacenter Edition
Microsoft Windows 2000 Server SP4
Microsoft Windows 2000 Server SP3
Microsoft Windows 2000 Server SP2
Microsoft Windows 2000 Server SP1
Microsoft Windows 2000 Server
Microsoft Windows 2000 Professional SP4
Microsoft Windows 2000 Professional SP3
Microsoft Windows 2000 Professional SP2
Microsoft Windows 2000 Professional SP1
Microsoft Windows 2000 Professional
Microsoft Windows 2000 Datacenter Server SP4
Microsoft Windows 2000 Datacenter Server SP3
Microsoft Windows 2000 Datacenter Server SP2
Microsoft Windows 2000 Datacenter Server SP1
Microsoft Windows 2000 Datacenter Server
Microsoft Windows 2000 Advanced Server SP4
Microsoft Windows 2000 Advanced Server SP3
Microsoft Windows 2000 Advanced Server SP2
Microsoft Windows 2000 Advanced Server SP1
Microsoft Windows 2000 Advanced Server


It has been reported that Windows 2003 SP1 and Windows 2000 SP4 with Update Roll-Up are not vulnerable to this issue. This was not confirmed by Symantec.


http://www.securityfocus.com/bid/15613/discuss

Leave a Reply