Various TCP/IP stacks and network applications allow remote attackers to cause a denial of service by flooding a target host with TCP connection attempts and completing the TCP/IP handshake without maintaining the connection state on the attacker host, aka the "NAPTHA" class of vulnerabilities. NOTE: this candidate may change significantly as the security community discusses the technical nature of NAPTHA and learns more about the affected applications. This candidate is at a higher level of abstraction than is typical for CVE.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/win2ksecadvice/2000-q4/0105.html | |
http://razor.bindview.com/publish/advisories/adv_NAPTHA.html | |
http://www.cert.org/advisories/CA-2000-21.html | Patch Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/2022 | Exploit Patch Vendor Advisory |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-091 |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2001-01-09 05:00
Updated : 2024-02-04 16:31
NVD link : CVE-2000-1039
Mitre link : CVE-2000-1039
CVE.ORG link : CVE-2000-1039
JSON object : View
Products Affected
microsoft
- windows_me
- windows_98se
- windows_nt
- windows_95
- windows_98
CWE