Skip to main content

Network Policy Server Denial of Service Vulnerability

Last Update Date: 15 Jan 2015 Release Date: 14 Jan 2015 3685 Views

RISK: Medium Risk

TYPE: Operating Systems - Windows OS

TYPE: Windows OS

This is a denial of service vulnerability. An unauthenticated attacker who successfully exploited this vulnerability could send specially crafted username strings to an Internet Authentication Service (IAS) or Network Policy Server (NPS), causing a denial of service condition for RADIUS authentication on the IAS or NPS. Note that the denial of service vulnerability would not allow an attacker to execute code or to elevate user rights; however, it could prevent RADIUS authentication on the IAS or NPS. An attacker who successfully exploited the vulnerability could cause the target system to stop responding. Network Policy Servers that allow remote, untrusted users to authenticate are at particular risk from this vulnerability. The update addresses the denial of service vulnerability by changing how Network Policy Servers parse username queries when implementing RADIUS.


Impact

  • Denial of Service

System / Technologies affected

  • Windows Server 2003
  • Windows Server 2008
  • Windows Server 2008 R2
  • Windows Server 2012 and Windows Server 2012 R2

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.


Vulnerability Identifier


Source


Related Link