Short Name |
ICMP:EXPLOIT:LAN-SMURF |
---|---|
Severity |
High |
Recommended |
No |
Category |
ICMP |
Keywords |
icmp lan smurf |
Release Date |
2004/01/29 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This protocol anomaly is an ICMP packet sent to a destination IP of 255.255.255.255 or to an all broadcast MAC address (ff:ff:ff:ff:ff:ff). Because this is a broadcast packet, all hosts in the broadcast segment reply to the sender, causing a denial-of-service (DoS) on the network. Attackers typically spoof the source IP of the packet to generate this attack.
The "Smurf" denial of service exploits the existance, and forwarding of, packets sent to IP broadcast addreses. By creating an ICMP echo request packet, with the source address set to an IP within the network to be attacked, and the destination address the IP broadcast address of a network which will forward and respond to ICMP echo packets sent to broadcast. Each packet sent in to the network being used to conduct the attack will be responded to by any machine which will respond to ICMP on the broadcast address. Therefore, a single packet can result in an overwhelming response count, all of which are directed to the network the attacker has forged as the source. This can result in significant bandwidth loss.