Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

DOS:UPNP-CHARGEN-DOS

Severity

Minor

Recommended

No

Recommended Action

Drop

Category

DOS

Keywords

NOTIFY Request Denial of Service

Release Date

2003/04/22

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

UPNP: NOTIFY Request Denial of Service


This signature detects attempts to exploit a known vulnerability against the UPNP service for Microsoft Windows XP. Attackers can send a malicious NOTIFY request that forces the UPNP daemon to connect to a malicious CHARGEN-like service on the sending host (the attacker's machine); thereby causing a denial-of-service condition by allowing the UPNP daemon to consume all available memory and CPU resources.

Extended Description

Universal Plug and Play (UPnP) on Windows 98, 98SE, ME, and XP allows remote attackers to cause a denial of service via (1) a spoofed SSDP advertisement that causes the client to connect to a service on another machine that generates a large amount of traffic (e.g., chargen), or (2) via a spoofed SSDP announcement to broadcast or multicast addresses, which could cause all UPnP clients to send traffic to a single target system.

Affected Products

  • Microsoft windows_98 (gold)
  • Microsoft windows_98se
  • Microsoft windows_me
  • Microsoft windows_xp (gold)

References

  • BugTraq: 3724
  • CERT: CA-2001-37
  • CVE: CVE-2001-0877
  • URL: http://research.eeye.com/html/advisories/published/AD20011220.html
  • URL: http://www.kb.cert.org/vuls/id/951555

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out