Re: LAND attack vulnerability on Windows Server 2003 and Windows XP

From: Thierry Zoller (Thierry_at_SNIFF-EM.COM)
Date: 03/10/05

  • Next message: NGSSoftware Insight Security Research: "Details of Sybase ASE bugs withheld"
    Date:         Thu, 10 Mar 2005 17:41:10 +0100
    To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
    
    

    Dear Marcio Vieira,
    MV> We were able to prevent the 100% CPU utilization by setting the value of
    MV> "SynAttackProtect" to 1 or 2 in the TCP/IP parameters:
    MV> HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
    MV> SynAttackProtect = 1 (DWORD)

    Just wanted to report that one, I set this value amongst others in my
    freeware network hardening tool "Harden-it" which can be downloaded
    from from http://www.sniff-em.com (Shameless advertising).

    --
    Thierry Zoller
    mailto:Thierry@sniff-em.com
    --
    NTBugtraq Editor's Note:
    Most viruses these days use spoofed email addresses. As such, using an Anti-Virus product which automatically notifies the perceived sender of a message it believes is infected may well cause more harm than good. Someone who did not actually send you a virus may receive the notification and scramble their support staff to find an infection which never existed in the first place. Suggest such notifications be disabled by whomever is responsible for your AV, or at least that the idea is considered.
    --
    

  • Next message: NGSSoftware Insight Security Research: "Details of Sybase ASE bugs withheld"