Bugtraq mailing list archives
Remote DoS attack in Networks Associates PGP Certificate Server Version 2.5 Vulnerability
From: labs () USSRBACK COM (Ussr Labs)
Date: Wed, 14 Jun 2000 09:15:07 -0300
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Remote DoS attack in Networks Associates PGP Certificate Server Version 2.5 Vulnerability USSR Advisory Code: USSR-2000044 Release Date: June 13, 2000 Systems Affected: PGP Certificate Server Version 2.5.0 *Solaris/Windows* PGP Certificate Server Version 2.5.1 *Solaris/Windows* THE PROBLEM The Ussr Labs team has recently discovered a null memory problem in the PGP Certificate Server, The issue we found is if anyone connect to the PGP Certificate Server Command Port (used for manage Server operations) default (Port 4000) and the server is unable to resolve your IP address to a host name it will cause the process containg the services to crash. SPECIAL NOTE: That we take no responsibility for this code it is for educational purposes only. Example: Denied all the ways to resolve you ip to hostname and connect to port 4000 in the server. the process containg the services crash and you will see something like this in the server http://www.ussrback.com/pgpbug.jpg Vendor Status: Informed!, Contacted!. Fix: Network Associates has released a patch for this vulnerability. Users should contact Network Associates Technical Support at 1-800-722-3709 for information. Vendor Url: http://www.nai.com Program Url: http://www.pgp.com/asp_set/products/tns/pgpcert_intro.asp Related Links: Underground Security Systems Research http://www.ussrback.com Greetings: Eeye, Attrition, w00w00, beavuh, Rhino9, SecurityFocus.com, ADM, HNN, Technotronic and Wiretrip. Copyright (c) 1999-2000 Underground Security Systems Research. Permission is hereby granted for the redistribution of this alert electronically. It is not to be edited in any way without express consent of Ussr. If you wish to reprint the whole or any part of this alert in any other medium excluding electronic medium, please e-mail labs () ussrback com for permission. Disclaimer: The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk. Feedback: Please send suggestions, updates, and comments to: Underground Security Systems Research mail:labs () ussrback com http://www.ussrback.com -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 6.5.2 for non-commercial use <http://www.pgp.com> iQA/AwUBOUd2qK3JcbWNj6DDEQIF0gCfbgEnvYBrOekrMaOkpxleWv+u0wUAn0oV hfaCrrshCJcdEoG8LKtMbRUq =BAA8 -----END PGP SIGNATURE-----
Current thread:
- BRU Vulnerability root (Jun 06)
- Re: BRU Vulnerability Gavrie Philipson (Jun 07)
- Re: BRU Vulnerability Jeremy Rauch (Jun 08)
- Re: BRU Vulnerability Theo Van Dinter (Jun 11)
- Re: BRU Vulnerability terry white (Jun 11)
- Exploit to the overflow in restore Ronald Huizer [Crew] (Jun 14)
- Remote DoS attack in Networks Associates PGP Certificate Server Version 2.5 Vulnerability Ussr Labs (Jun 14)
- BEA WebLogic JSP showcode vulnerability stuart.mcclure () FOUNDSTONE COM (Jun 11)
- Re: BRU Vulnerability Jeremy Rauch (Jun 08)
- Microsoft Security Bulletin (MS00-040) Microsoft Product Security (Jun 08)
- Mission statement for LKAP(Linux Kernel Auditing Project) Bryan Paxton (Jun 08)
- Re: BRU Vulnerability Gavrie Philipson (Jun 07)