McAfee Firewall
94
McAfee Internet Security 5.0
Common attacks recognized by IDS
The following table lists attacks recognized by McAfee Firewall’s IDS, a
description of each attack, and the risk factor assigned to each attack.
Attack
Description
Risk
Factor
1234
Also known as the Flushot attack, an attacker sends an oversize ping
packet that networking software could not handle. Usually, computers
hang or slows down. If a total lockup occurs, unsaved data may be lost.
Medium
Back Orifice
Back Orifice is a back door program for Windows 9x written by a group
calling themselves the Cult of the Dead Cow. This back door allows
remote access to the machine once installed, allowing the installer to run
commands, get screen shots, modify the registry, and perform other
operations. Client programs to access Back Orifice are available for
Windows and UNIX.
High
Bonk
Designed to exploit an implementation error in the first Teardrop patch
released by Microsoft, this attack is basically a Windows-specific variant of
the original Teardrop attack.
High
Fraggle
This attack is a UDP variant of the Smurf attack. By sending a forged UDP
packet to a particular port on a broadcast address, systems on the
“amplifier” network will respond to the target machine with either a UDP
response or an ICMP UNREACHABLE packet. This flood of incoming
packets results in a denial of service attack against the target machine.
High
IP Spoofing
IP spoofing involves sending data with a falsified return IP address. There
is nothing inherently dangerous about spoofing a source IP address, but
this technique can be used in conjunction with others to carry out attacks
TCP session hijacking, or to obscure the source of denial of service
attacks (SYN flood, PING flood, etc.).
Medium
Jolt
A remote denial of service attack using specially crafted ICMP packet
fragments. May cause slowdowns or crashes on target systems.
High
Jolt 2
A remote Denial of Service (DoS) attack similar to Jolt that uses specially
crafted ICMP or UDP packet fragments. May cause slowdowns or crashes
on target systems.
High
Land
This attack is performed by sending a TCP packet to a running service on
the target host, with a source address of the same host. The TCP packet
is a SYN packet, used to establish a new connection, and is sent from the
same TCP source port as the destination port. When accepted by the
target host, this packet causes a loop within the operating system,
essentially locking up the system.
High
Nestea
This attack relies on an error in calculating sizes during packet fragment
reassembly. In the reassembly routine of vulnerable systems, there was a
failure to account for the length of the IP header field. By sending carefully
crafted packets to a vulnerable system, it is possible to crash the target.
High
Содержание INTERNET SECURITY 5.0
Страница 1: ...P R O D U C T G U I D E McAfee Internet Security 5 0 V E R S I O N 5 0...
Страница 56: ...Getting Started with McAfee Internet Security 5 0 56 McAfee Internet Security 5 0...
Страница 116: ...Internet Security and Privacy 116 McAfee Internet Security 5 0...
Страница 127: ...Product Guide 127 Index...