exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

nmrc.98-09-30.nt.dos

nmrc.98-09-30.nt.dos
Posted Sep 23, 1999

nmrc.98-09-30.nt.dos

SHA-256 | 141c1b94081551cb03b78cf8bb7b4de6a76817b1e9fbe0dd601318135b775c64

nmrc.98-09-30.nt.dos

Change Mirror Download

From aleph1@DFW.NET Sat Oct 17 21:25:34 1998
From: Aleph One <aleph1@DFW.NET>
X-Sender: aleph1@dfw.nationwide.net
To: BUGTRAQ@netspace.org
Date: Mon, 5 Oct 1998 15:21:10 -0500
Subject: NMRC Advisory - Lame NT Token Ring DoS

---------- Forwarded message ----------
Date: Fri, 2 Oct 1998 01:04:20 -0500
From: Simple Nomad <thegnome@NMRC.ORG>
To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
Subject: NMRC Advisory - Lame NT Token Ring DoS

_______________________________________________________________________________

Nomad Mobile Research Centre
A D V I S O R Y
www.nmrc.org
Simple Nomad [thegnome@nmrc.org]
30Sep1998
_______________________________________________________________________________

Platform : Windows NT
Application : TCP/IP
Severity : Medium


Synopsis
--------

On Token Ring networks a packet with bad data in the RIF fields will cause
all Windows NT workstations and servers on the ring to crash with a blue
screen of death.

Tested configuration
--------------------

The default settings were tested with the following configuration :

Microsoft Windows NT Server and Workstation v4.0
Service Pack 3
Most SP3 Hot Fixes

Bug(s) report
-------------

When a Token Ring frame passes through a bridge, the bridge will update
the Routing Information Field (RIF) with its ID number, among other little
bits of information (including info that limits the size of the data
field). This information is used to help route traffic back and forth
between rings connected by bridges.

On Token Ring if you have a hop count greater than 7 defined in the RIF
fields this will cause Windows NT's TCP/IP stack to "blue screen", forcing
the user to reboot. Also if there are duplicate Token Ring IDs listed in
the hops this will also "blue screen" NT. The bad news is that the packet
does not have to be addressed to the NT target to blue screen it. It will
blue screen every NT workstation or server on the ring. The good news is
that properly configured and functioning network equipment will not pass
this type of illegal packet across a hop to a different ring, so the
Denial of Service will be limited to one ring.

It is possible that some routers will allow RIF fields to have more than 7
hops, but unless they have been configured to handle this it will not pass
the packet across a hop as it is considered a bad frame. It should be
noted that in all related RFCs it is clearly stated that >7 is a no-no and
should not be done.

Malfunctioning network equipment could cause this to happen, as this is
how the information was originally discovered.

There was no related/discovered Netbios flaws, in particular if
encapsulation was being used to cross WAN links.

Solution/Workaround
-------------------

Move to Ethernet, or contact Microsoft for the RIF Hot Fix, which was not
posted last time I looked. I'll assume the latter would be easier.

Comments
--------

This is rather lame, but since I personally know of 2 Token Ring sites
that this affected in my town alone, I thought I might pass it on.

When Microsoft was contacted 4 weeks ago they reported that more than one
corporate customer had reported the problem, and they had a hot fix they
were testing. Most sites are on Ethernet, and most elite sploit code talks
Ethernet frames anyway, so my guess is you'll have to ask for it. On a
personal note, it is a lot of fun to watch a row of NT machines all die
one after another, making for a very visual test of packet speed.

Thanks to Mike for letting me know about this, and thanks to a small
unnamed Dallas accounting firm that graciously let me test this on their
networks after hours. They were convinced they were under outside attack,
but a malfunctioning bridge was the culprit.

_______________________________________________________________________________
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close