Vulnerability Name: | CVE-2000-0305 (CCN-4518) | ||||||||
Assigned: | 2000-05-19 | ||||||||
Published: | 2000-05-19 | ||||||||
Updated: | 2018-10-12 | ||||||||
Summary: | Windows 95, Windows 98, Windows 2000, Windows NT 4.0, and Terminal Server systems allow a remote attacker to cause a denial of service by sending a large number of identical fragmented IP packets, aka jolt2 or the "IP Fragment Reassembly" vulnerability. | ||||||||
CVSS v3 Severity: | 4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||||
CVSS v2 Severity: | 7.8 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
| ||||||||
Vulnerability Type: | CWE-399 | ||||||||
Vulnerability Consequences: | Denial of Service | ||||||||
References: | Source: CCN Type: BugTraq Mailing List, Fri May 26 2000 - 08:18:38 CDT Addendum: Analysis of jolt2.c (MS00-029) Source: CCN Type: BugTraq Mailing List, Fri May 26 2000 - 06:18:13 CDT Analysis of jolt2.c (MS00-029) Source: MITRE Type: CNA CVE-2000-0305 Source: CCN Type: BindView RAZOR Security Advisory, May 19, 2000 Jolt2 - Remote Denial of Service attack against Windows 2000, NT4, and Win9x Source: CCN Type: Microsoft Security Bulletin MS00-029 Patch Available for 'IP Fragment Reassembly' Vulnerability Source: CCN Type: Microsoft Security Bulletin MS01-033 Unchecked Buffer in Index Server ISAPI Extension Could Enable Web Server Compromise Source: CCN Type: Microsoft Security Bulletin MS01-041 Malformed RPC Request Can Cause Service Failure Source: CCN Type: Microsoft Security Bulletin MS01-044 15 August 2001 Cumulative Patch for IIS Source: CCN Type: Microsoft Security Bulletin MS02-001 Trusting Domains Do Not Verify Domain Membership of SIDs in Authorization Data Source: CCN Type: Microsoft Security Bulletin MS02-018 Cumulative Patch for Internet Information Services (Q319733) Source: CCN Type: OSVDB ID: 335 Microsoft Windows Fragmented IP Packet Saturation DoS (jolt2) Source: CCN Type: OSVDB ID: 59758 Symantec Norton Personal Firewall 2002 (NPW) Block Fragmented IP Packets Functionality Bypass Source: BID Type: Third Party Advisory, VDB Entry 1236 Source: CCN Type: BID-1236 Multiple Vendor Fragmented IP Packets DoS Vulnerability Source: BINDVIEW Type: Third Party Advisory, VDB Entry 20000519 jolt2 - Remote DoS against NT, W2K, 9x Source: MS Type: UNKNOWN MS00-029 Source: XF Type: UNKNOWN ip-fragment-reassembly-dos(4518) Source: CCN Type: Microsoft Knowledge Base Article 259728 Windows Hangs with Fragmented IP Datagrams | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||
BACK |