Short Name |
DOS:UPNP-CHARGEN-DOS |
---|---|
Severity |
Minor |
Recommended |
No |
Recommended Action |
Drop |
Category |
DOS |
Keywords |
NOTIFY Request Denial of Service |
Release Date |
2003/04/22 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability against the UPNP service for Microsoft Windows XP. Attackers can send a malicious NOTIFY request that forces the UPNP daemon to connect to a malicious CHARGEN-like service on the sending host (the attacker's machine); thereby causing a denial-of-service condition by allowing the UPNP daemon to consume all available memory and CPU resources.
Universal Plug and Play (UPnP) on Windows 98, 98SE, ME, and XP allows remote attackers to cause a denial of service via (1) a spoofed SSDP advertisement that causes the client to connect to a service on another machine that generates a large amount of traffic (e.g., chargen), or (2) via a spoofed SSDP announcement to broadcast or multicast addresses, which could cause all UPnP clients to send traffic to a single target system.