NETBIOS: RFParalyze NULL Session DOS Attack
This signature detects attempts to exploit a known vulnerability against Microsoft Windows 95/98. Attackers can send NULL source host names within a NETBIOS session to disrupt network connectivity or cause the system to lock-up, crash, or reboot.
Extended Description
Unpredictable results, including system crashes, lock-ups, reboots, and loss of network connectivity, can occur in Windows 95/98 if a NetBIOS session packet is received with the source host name set to NULL.
Affected Products
Microsoft windows_98
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Microsoft
5.0