Thanks to John Nuechterlein for the tip: Microsoft has released a new post-SP3 hot-fix for Windows NT 4.0 that prevents a new denial-of-service attack called "teardrop" from affecting the system. The teardrop attack works by sending pairs of deliberately constructed IP fragments which are reassembled into an invalid UDP datagram. Overlapping offsets cause the second packet to overwrite data in the middle of the UDP header contained in the first packet in such a way that the datagrams are left incomplete. This causes a STOP error on NT, rendering the system useless. To download the hot-fix, check out the Microsoft FTP site
0 comments
Hide comments