Korean
<< Back
VID 12053
Severity 40
Port
Protocol TCP
Class Protocol
Detailed Description The machine appears to be crashed by the 'land' attack using a "loopback" condition. A number of TCP/IP stacks are vulnerable to a "loopback" condition initiated by sending a TCP SYN packet with the source address and port spoofed to equal the destination address and port. When a packet of this sort is received, an infinite loop is initiated and the affected system halts.
Land is a widely available attack tool that exploits this vulnerability.

* References:
http://www.cert.org/advisories/CA-1997-28.html
http://ciac.llnl.gov/ciac/bulletins/i-019.shtml

* Platforms Affected:
Windows 95, Windows NT 4.0 up to SP3
Cisco IOS devices & catalyst switches
HP-UX up to 11.00
FreeBSD Any version
Recommendation For Windows NT:
Apply the latest Service Pack (SP4 or later) for Windows NT, available from the Microsoft Web site at http://support.microsoft.com/support/ntserver/Content/ServicePacks/

For HP-UX:
Apply the appropriate patch for your system, as listed in Hewlett-Packard Security Bulletin HPSBUX9801-076 at http://online.securityfocus.com/advisories/1481

For FreeBSD:
Apply the patch dated 1998-01, as listed in FreeBSD, Inc. Security Advisory FreeBSD-SA-98:01 at ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/old/FreeBSD-SA-98:01.land.asc

For Novell NetWare:
Apply the ftcpsv09.exe (or later), and modify the STARTUP.NCF file to block these type of attacks, as listed in Novell Technical Information Document #2932511 at http://support.novell.com/cgi-bin/search/tidfinder.cgi?2932511

For other distributions:
Contact your vendor for upgrade or patch information.

As a workaround, filter out all incoming packets claiming to originate from the internal network.
Related URL CVE-1999-0016 (CVE)
Related URL 2666 (SecurityFocus)
Related URL 288 (ISS)