Parent class: Malware
Malicious tools are malicious programs designed to automatically create viruses, worms, or Trojans, conduct DoS attacks on remote servers, hack other computers, etc. Unlike viruses, worms, and Trojans, malware in this subclass does not present a direct threat to the computer it runs on, and the program’s malicious payload is only delivered on the direct order of the user.Read more
Class: DoS
DoS programs are designed to conduct DoS (Denial of Service) attacks on a victim computer. Essentially, these attacks send numerous requests to a remote computer, and if the computer does not have enough resources to process all the incoming requests, the result will be a denial of service.Read more
Platform: OSX
No platform descriptionDescription
DoS A denial of service (DoS) attack prevents normal use of your organization’s computer or network resource by valid users. This type of attack takes advantage of the specific capacity limits that apply to any network resources. The aim of the attack is to overwhelm the capacity of the website to handle multiple requests and to prevent the website or network resource from functioning correctly. DoS attacks can also be caused by a remote exploit that results in a system crash. A successful DoS attack can result in increased response time, or unavailability or crash of a network service or computer. Description A DoS.OSX.Yosemite.ICMP.Error.exploit attack takes advantage of a vulnerability in the kernel of Darwin—an open-source component of macOS operating systems (https://securelist.com/darwin-nuke/69462/)—and can cause denial of service due to a system crash. An attacker can send a specifically crafted IP packet that has a specific size and invalid IP options, and as a result can cause the affected system to stop responding and crash. A successful DoS.OSX.Yosemite.ICMP.Error.exploit can result in denial of service.Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!