ICMP IP Total Length Field Probe |
Attack Pattern ID: 331 (Detailed Attack Pattern) | Typical Severity: Low | Status: Draft |
Summary
An attacker sends a UDP packet to a closed port on the target machine to solicit an IP Header's total length field value within the echoed 'Port Unreachable" error message. RFC1122 specifies that the Header of the request must be echoed back when an error is sent in response, but some operating systems and firmware alter the integrity of the original header. Non-standard ICMP/IP implementations result in response that are useful for individuating remote operating system or router firmware versions. There are four general response types that can be used to distinguish operating systems apart.
1. The IP total length field may be calculated correctly.
2. An operating system may add 20 or more additional bytes to the length calculation.
3. The operating system may subtract 20 or more bytes from the correct length of the field
4. The IP total length field is calculated with any other incorrect value.
This type of behavior is useful for building a signature-base of operating system responses, particularly when error messages contain other types of information that is useful identifying specific operating system responses.
Target Attack Surface Description
Targeted OSI Layers: Network Layer
Target Attack Surface Localities
Target Attack Surface Types: Host
Target Functional Services
Target Functional Service 1: None | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Protocol 1: ICMP | ||||||||||||||||||
|
Nature | Type | ID | Name | Description | View(s) this relationship pertains to |
---|---|---|---|---|---|
ChildOf | Attack Pattern | 316 | ICMP Fingerprinting Probes | Mechanism of Attack (primary)1000 |