Various TCP/IP stacks and network applications allow remote attackers to cause a denial of service by flooding a target host with TCP connection attempts and completing the TCP/IP handshake without maintaining the connection state on the attacker host, aka the "NAPTHA" class of vulnerabilities. NOTE: this candidate may change significantly as the security community discusses the technical nature of NAPTHA and learns more about the affected applications. This candidate is at a higher level of abstraction than is typical for CVE.
Link | Tags |
---|---|
http://www.cert.org/advisories/CA-2000-21.html | us government resource third party advisory patch |
http://razor.bindview.com/publish/advisories/adv_NAPTHA.html | vendor advisory |
http://archives.neohapsis.com/archives/win2ksecadvice/2000-q4/0105.html | mailing list |
http://www.securityfocus.com/bid/2022 | exploit vdb entry patch vendor advisory |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-091 | vendor advisory |