[9731] in bugtraq

home help back first fref pref prev next nref lref last post

Re: NT DoS on FW-1

daemon@ATHENA.MIT.EDU (Matt Hargett)
Mon Feb 22 14:09:47 1999

Date: 	Sun, 21 Feb 1999 17:43:44 -0600
Reply-To: Matt Hargett <hargett@WINTERMUTE.CITYSCAPE.NET>
From: Matt Hargett <hargett@WINTERMUTE.CITYSCAPE.NET>
To: BUGTRAQ@NETSPACE.ORG

>This issue can be fixed by simply implementing a stealthing rule on the
>firewall itself. The problem is in NT's stack, not the FireWalls.
>
> Jamie Thain wrote:
>
> > Timothy,
> >
> > > I was running nmap against a client's Checkpoint FW-1
> > > when they called to inform me that it had crashed.  I
> > > was not on site so unfortunately I have little
> > > details.
> >
> > I have seen this befor where a high speed port scanner running against
a
> > FW-1 on NT seems to crash it. FW-1 does not exhibit this behaviour on
> > Sun. You may want to check and make sure you have the most recent
patch
> > level. That information is on the FW-1 site.
> >
> > > I DO know that they were running it on a NT
> > > box and it was behind a Cisco 3640.

I have done a bit of testing using nmap against NT 4.0 with
SP4. My findings were that plain NT 4.0 SP4 doesn't
crash/behave erratically by itself with the many instances of nmap
options that I tried. Certainly not a simple SYN scan with OS
fingerprinting.

What exactly is the problem in NT's stack and how exactly can you measure
it's adverse reaction? I was looking under task manager at the nonpaged
kernel memory, process, thread, and handle counts.


-----------------------------------------
Matt Hargett
http://www.cityscape.net/~hargett
matt@use.net

sex on the TV, everybody's at it
and the mind gets dirty
as you get closer
to thirty

home help back first fref pref prev next nref lref last post