Link to home
Start Free TrialLog in
Avatar of MarkSal
MarkSal

asked on

Teardrop attack

We have a juniper netscreen which has a VPN tunnel to/from ip 209.90.159.58 and I am seeing the following in the log files of the netscreen:

Teardrop attack! From 209.90.159.58 to 209.90.159.60, proto 50 (zone Untrust, int ethernet3). Occurred 1 times.

any information to help me determine why would be helpful
Avatar of jhill777
jhill777

A Teardrop attack involves sending mangled IP fragments with overlapping, over-sized payloads to the target machine. This can crash various operating systems due to a bug in their TCP/IP fragmentation re-assembly code.[5] Windows 3.1x, Windows 95 and Windows NT operating systems, as well as versions of Linux prior to versions 2.0.32 and 2.1.63 are vulnerable to this attack.

Around September 2009, a vulnerability in Vista was referred to as a "teardrop attack", but the attack targeted SMB2 which is a higher layer than the TCP packets that teardrop used
ASKER CERTIFIED SOLUTION
Avatar of jhill777
jhill777

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of MarkSal

ASKER

yes I know the destination and source IP...so does that mean a fals positive?
Yeah, I would assume so and it's not really a threat to newer operating systems anyway.
Avatar of MarkSal

ASKER

Fixed