WinGate Telnet Proxy localhost Connection Saturation DoS

medium Nessus Plugin ID 10310

Synopsis

The remote proxy is vulnerable to denial of service.

Description

The remote Wingate service can be forced to connect to itself continually until it runs out of buffers. When this happens, the telnet proxy service will be disabled.

An attacker may block your telnet proxy this way, thus preventing your system from working properly if you need telnet. An attacker may also use this flaw to force your systems to use another proxy which may be under the attacker's control.

Solution

Configure WinGate so that only authorized users can use it.

See Also

https://seclists.org/bugtraq/1998/Feb/86

Plugin Details

Severity: Medium

ID: 10310

File Name: wingate_denial.nasl

Version: 1.27

Type: remote

Agent: windows

Family: Windows

Published: 6/22/1999

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: cpe:/a:qbik:wingate

Required KB Items: wingate/enabled

Vulnerability Publication Date: 2/21/1998

Reference Information

CVE: CVE-1999-0290