CVE-2000-0305: Windows 95, Windows 98, Windows 2000, Windows NT 4.0, and Terminal Server systems allow a remote att
Windows 95, Windows 98, Windows 2000, Windows NT 4.0, and Terminal Server systems allow a remote attacker to cause a denial of service by sending a large number of identical fragmented IP packets, aka jolt2 or the "IP Fragment Reassembly" vulnerability.
AI Analysis
Technical Summary
CVE-2000-0305 is a high-severity denial of service (DoS) vulnerability affecting legacy Microsoft operating systems including Windows 95, Windows 98, Windows 2000, Windows NT 4.0, and Terminal Server systems. The vulnerability arises from improper handling of IP fragment reassembly. Specifically, these systems allow a remote attacker to send a large number of identical fragmented IP packets, which triggers excessive resource consumption during the reassembly process. This can cause the target system to become unresponsive or crash, effectively resulting in a denial of service. The vulnerability is also known as "jolt2" or the "IP Fragment Reassembly" vulnerability. It requires no authentication and no user interaction, making it exploitable remotely by any attacker capable of sending crafted network packets to the target system. The CVSS v2 base score is 7.8, reflecting a high impact on availability with no impact on confidentiality or integrity. A patch addressing this vulnerability was released by Microsoft in May 2000 (MS00-029). There are no known exploits in the wild documented at this time, but the vulnerability remains relevant for legacy systems still in operation. The vulnerability is categorized under CWE-399 (Resource Management Errors), highlighting the root cause as improper resource handling during IP packet processing.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential disruption of critical services hosted on affected legacy Windows systems. Denial of service attacks exploiting this vulnerability could lead to downtime of servers, including Terminal Servers, which may be used for remote access or application hosting. This disruption can affect business continuity, especially in sectors relying on legacy infrastructure such as manufacturing, utilities, or government agencies that have not fully migrated to modern platforms. Although confidentiality and integrity are not directly impacted, the availability loss can cause operational delays, financial losses, and reputational damage. Additionally, denial of service conditions could be leveraged as part of multi-vector attacks or to distract security teams while other attacks are conducted. Given the age of the affected systems, organizations still running these OS versions are likely to be at higher risk due to lack of vendor support and modern security controls.
Mitigation Recommendations
1. Immediate application of the official Microsoft patch MS00-029 on all affected systems is the most effective mitigation. 2. For systems that cannot be patched due to legacy constraints, network-level mitigations should be implemented, such as filtering or rate-limiting fragmented IP packets at firewalls or intrusion prevention systems to prevent flooding with identical fragments. 3. Segmentation of legacy systems from critical network segments and limiting exposure to untrusted networks reduces attack surface. 4. Monitoring network traffic for unusual patterns of fragmented packets can provide early warning of exploitation attempts. 5. Where possible, upgrade or migrate legacy Windows systems to supported versions with improved security and patch management capabilities. 6. Employ network anomaly detection tools that can identify and alert on IP fragmentation abuse. 7. Conduct regular security audits to identify legacy systems still in use and prioritize their remediation or isolation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2000-0305: Windows 95, Windows 98, Windows 2000, Windows NT 4.0, and Terminal Server systems allow a remote att
Description
Windows 95, Windows 98, Windows 2000, Windows NT 4.0, and Terminal Server systems allow a remote attacker to cause a denial of service by sending a large number of identical fragmented IP packets, aka jolt2 or the "IP Fragment Reassembly" vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2000-0305 is a high-severity denial of service (DoS) vulnerability affecting legacy Microsoft operating systems including Windows 95, Windows 98, Windows 2000, Windows NT 4.0, and Terminal Server systems. The vulnerability arises from improper handling of IP fragment reassembly. Specifically, these systems allow a remote attacker to send a large number of identical fragmented IP packets, which triggers excessive resource consumption during the reassembly process. This can cause the target system to become unresponsive or crash, effectively resulting in a denial of service. The vulnerability is also known as "jolt2" or the "IP Fragment Reassembly" vulnerability. It requires no authentication and no user interaction, making it exploitable remotely by any attacker capable of sending crafted network packets to the target system. The CVSS v2 base score is 7.8, reflecting a high impact on availability with no impact on confidentiality or integrity. A patch addressing this vulnerability was released by Microsoft in May 2000 (MS00-029). There are no known exploits in the wild documented at this time, but the vulnerability remains relevant for legacy systems still in operation. The vulnerability is categorized under CWE-399 (Resource Management Errors), highlighting the root cause as improper resource handling during IP packet processing.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential disruption of critical services hosted on affected legacy Windows systems. Denial of service attacks exploiting this vulnerability could lead to downtime of servers, including Terminal Servers, which may be used for remote access or application hosting. This disruption can affect business continuity, especially in sectors relying on legacy infrastructure such as manufacturing, utilities, or government agencies that have not fully migrated to modern platforms. Although confidentiality and integrity are not directly impacted, the availability loss can cause operational delays, financial losses, and reputational damage. Additionally, denial of service conditions could be leveraged as part of multi-vector attacks or to distract security teams while other attacks are conducted. Given the age of the affected systems, organizations still running these OS versions are likely to be at higher risk due to lack of vendor support and modern security controls.
Mitigation Recommendations
1. Immediate application of the official Microsoft patch MS00-029 on all affected systems is the most effective mitigation. 2. For systems that cannot be patched due to legacy constraints, network-level mitigations should be implemented, such as filtering or rate-limiting fragmented IP packets at firewalls or intrusion prevention systems to prevent flooding with identical fragments. 3. Segmentation of legacy systems from critical network segments and limiting exposure to untrusted networks reduces attack surface. 4. Monitoring network traffic for unusual patterns of fragmented packets can provide early warning of exploitation attempts. 5. Where possible, upgrade or migrate legacy Windows systems to supported versions with improved security and patch management capabilities. 6. Employ network anomaly detection tools that can identify and alert on IP fragmentation abuse. 7. Conduct regular security audits to identify legacy systems still in use and prioritize their remediation or isolation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Patch Information
Threat ID: 682ca32db6fd31d6ed7dfb3b
Added to database: 5/20/2025, 3:43:41 PM
Last enriched: 6/19/2025, 6:33:38 PM
Last updated: 7/25/2025, 7:39:24 PM
Views: 9
Related Threats
CVE-2025-54413: CWE-351: Insufficient Type Distinction in skops-dev skops
HighCVE-2025-54412: CWE-351: Insufficient Type Distinction in skops-dev skops
HighCVE-2025-54385: CWE-20: Improper Input Validation in xwiki xwiki-platform
HighCVE-2025-54378: CWE-285: Improper Authorization in haxtheweb issues
HighCVE-2025-54366: CWE-502: Deserialization of Untrusted Data in freescout-help-desk freescout
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.