Describe the IP fragments reassembly vulnerability in Windows 2000.

What will be an ideal response?


A bug in the Windows 2000 code component that handles the reassembly of IP fragments causes the target system to spend all the CPU time to process IP packets that have been modified by hackers. The processing of such packets can deny the services of a system to the users for some time. In some critical stages, this vulnerability may even cause a system to crash. Hackers can use this vulnerability to perform denial-of-service attacks on a computer that is running Windows 2000. However, it is very difficult for a hacker to exploit this vulnerability on computers that are protected by firewalls and proxy servers. In most cases, they exploit this vulnerability on computers where Web servers are installed.Patches for this vulnerability are available in the latest service packs of Win2K.

Computer Science & Information Technology

You might also like to view...

Round the values down at the places noted.

16.9 at units place

Computer Science & Information Technology

What is the purpose of random access memory in the computer system?

a. to store easily accessible information permanently b. to transfer several bits of data simultaneously c. to monitor data usage d. to temporarily store information

Computer Science & Information Technology

Which protocol is the Cisco protocol for accomplishing aggregation?

A. Port Aggregation Protocol (PAgP) B. Link Aggregation Control Protocol (LACP) C. VLAN Trunking Protocol (VTP) D. Point-to-Point Tunneling Protocol (PPTP)

Computer Science & Information Technology

To keep subclasses from overriding a method, add the keyword ____________ to the method's heading.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology