ID CVE-1999-0275
Summary Denial of service in Windows NT DNS servers by flooding port 53 with too many characters.
References
Vulnerable Configurations
  • Microsoft Windows NT
    cpe:2.3:o:microsoft:windows_nt
CVSS
Base: 5.0 (as of 01-01-2004 - 00:00)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
nessus via4
NASL family DNS
NASL id WINNT_DNS_FLOOD.NASL
description We could make the remote DNS server crash by flooding it with characters. It is likely a WindowsNT DNS server. Crashing the DNS server could allow an attacker to make your network non-functional, or even to use some DNS spoofing techniques to gain privileges on the network.
last seen 2019-02-21
modified 2018-08-15
plugin id 10312
published 1999-06-22
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=10312
title WindowsNT DNS Server Character Saturation DoS
refmap via4
ms Q169461
xf
  • nt-dnscrash
  • nt-dnsver
Last major update 09-09-2008 - 08:34
Published 10-06-1997 - 00:00
Back to Top