McAfee Firewall

Attack

Description

Risk

 

 

Factor

 

 

 

Newtear

A Denial of Service (DoS) attack that usually causes computers with a

High

 

Windows NT-based operating system to crash. Although the attack is not

 

 

usually harmful to the computer itself, data from running applications will

 

 

most certainly be lost.

 

 

 

 

Oshare

A Denial of Service (DoS) attack caused by sending a unique packet

High

 

structure to your computer. The results of these attacks can vary from a

 

 

complete system crash, increased CPU load, or momentary delays,

 

 

depending upon your computer’s configuration. This will affect almost all

 

 

versions of Windows 98 and NT-based systems with varying degrees

 

 

based on the hardware involved.

 

 

 

 

Ping Flood

This attack involves sending very large numbers of ICMP ECHO (PING)

High

 

requests to the host under attack. This attack is particularly effective when

 

 

the attacker has a faster network connection than the victim.

 

 

 

 

Ping of Death

With this attack, a remote user can cause your system to reboot or panic

High

 

by sending it an oversized PING packet. This is done by sending a

 

 

fragmented packet larger than 65536 bytes in length, causing the remote

 

 

system to incorrectly process the packet. The result is that the remote

 

 

system will reboot or panic during processing.

 

 

 

 

Port Scanning

While not an attack in and of itself, a port scan often indicates that an

Low

 

attacker has begun looking at your system for potential weaknesses. A

 

 

port scan consists of checking every TCP and/or UDP port to see what

 

 

services (and hence, what vulnerabilities) might be present.

 

 

 

 

Saihyousen

The Saihyousen attack may cause some firewalls to crash. It is caused by

High

 

an attacker sending a stream of UDP packets.

 

 

 

 

Smurf

This attack is carried out by sending an ICMP ECHO REQUEST (PING)

High

 

packet with a forged source address matching that of the target system.

 

 

This packet is sent to “amplifier” networks — networks that allow sending

 

 

packets to the broadcast address — so that every machine on the

 

 

amplifier network will respond to what they think is a legitimate request

 

 

from the target. As a result, the target system is flooded with ICMP ECHO

 

 

REPLY messages, causing a denial of service attack.

 

 

 

 

SynDrop

Overlapping fragmented data sent by an attacker causes your computer to

High

 

become unstable and or crash. Unsaved data could be lost.

 

 

 

 

Syn Flood

This attack can be used to completely disable your network services by

High

 

flooding them with connection requests. This will fill the queue which

 

 

maintains a list of unestablished incoming connections, forcing it to be

 

 

unable to accept additional connections.

 

 

 

 

Teardrop

On vulnerable systems, it is possible to take advantage of a flaw in the

High

 

way the TCP/IP stack handles fragmented packet reassembly to consume

 

 

available memory resources. By sending a specially crafted IP datagram,

 

 

this attack can cause many operating systems to hang or reboot.

 

 

 

 

Product Guide

87

Page 87
Image 87
McAfee 5 manual McAfee Firewall