WinGate DNS Compressed Name Pointer DoS

medium Nessus Plugin ID 23732

Synopsis

The remote proxy is affected by a denial of service vulnerability.

Description

The remote host appears to be running WinGate, a Windows application for managing and securing Internet access.

The version of WinGate installed on the remote host contains a flaw involving the processing of DNS requests with compressed name pointers. By sending a specially crafted DNS request to a UDP port on which WinGate is listening, an unauthenticated, remote attacker can cause the affected application to consume 100% of the available CPU, thereby denying service to legitimate users.

Solution

Upgrade to WinGate 6.2.0 or later.

See Also

http://www.nessus.org/u?034616cf

https://seclists.org/fulldisclosure/2006/Nov/396

http://forums.qbik.com/viewtopic.php?t=4215

Plugin Details

Severity: Medium

ID: 23732

File Name: wingate_620.nasl

Version: 1.18

Type: local

Agent: windows

Family: Windows

Published: 11/27/2006

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 11/26/2006

Reference Information

CVE: CVE-2006-4518

BID: 21295