Chargen service |
---|
Risk Level: | Medium | Check or Attack Name: chargen |
---|---|---|
Platforms: | Any | |
Description: | The chargen service was detected as running. The chargen (port 19) service can be spoofed into sending data from one service on one machine to another service on another machine. This action causes an infinite loop and creates a denial of service attack. The attack can consume increasing amounts of network bandwidth, causing loss of performance or a total shutdown of the affected network segments. In addition, URLs such as "http://localhost:19" could cause a similar denial of service to a system running Lynx and chargen. Netscape Navigator disallows access to port 19 and is not vulnerable. |
|
Remedy: | Disable the service, unless it is needed. Unix: To disable chargen when started from inetd, follow these steps:
Windows: The chargen service is not native to Windows, but may be present. To disable only the chargen service, follow these steps:
|
|
References: | CERT Advisory CA-96.01, UDP Port Denial-of-Service Attack, http://www.cert.org/advisories/CA-96.01.UDP_service_denial.html BUGTRAQ Mailing List, Doctor Who (drwho@L0PHT.COM), Lynx/MSIE denial-of-service, http://www.geek-girl.com/bugtraq/1997_1/0264.html CERT Advisory CA-96.01, UDP Port Denial-of-Service Attack, ftp://info.cert.org/pub/cert_advisories/CA-96.01.UDP_service_denial |
Know Your Risks |