Important Information

On August 12th, 2022, many of Keysight’s Network Test, Network Visibility, & Edge to Core (NAS/formerly Ixia) products will migrate to a new license structure.

CRITICAL: If you perform licensing operations after August 12th, 2022, without upgrading the licensing software to the latest version, licenses may not register properly, and some features may be missing. This could impact testing and result in downtime.

For details, click here.

Strike ID:
D18-0n5b2
CVSS:
5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
False Positive:
f
Variants:
1
Year:
2018

Description

This strike exploits a denial of serviceDoS vulnerability in IP fragments. The vulnerability is caused by the way how out-of-order IP fragments are handled from the kernel. A remote attacker could exploit this vulnerability by keep sending large amount crafted IP segments packet to the target server. Successful exploitation is able to exhaust target servers resource and lead to denial-of-service. *Note: Although this Strike sends the appropriate packets to trigger the vulnerability, in practice, we have found that actually crashing the endpoint requires a very high frame rate, higher than the Security Engine can provide. If you would like to try this at a higher rate, simply run this Strike against your DUT as you normally would, but take the capture from the port and then create a new test using the Recreate Component. Just import the PCAP you extracted and set the options Send without modification and Unlimited Bandwidth and finally Use User based settings

CVE

References

MSB

BID

ExploitDB

Secunia

Security Tracker

Metasploit

ZDI

Google

OSVDB

{}