Multiple IRC Client Non-registered User parse_client_queued Saturation DoS

medium Nessus Plugin ID 14253

Synopsis

The remote IRC server is affected by a denial of service attack.

Description

The remote host is running a version of ircd which is vulnerable to a rate-limiting Denial of Service (DoS) attack. The flaw is in the fact that the IRCD daemon reserves more than 500 bytes of memory for each line received.

An attacker, exploiting this flaw, would need network access to the IRC server. A successful attack would render the IRC daemon, and possibly the entire system, unusable.

The following IRC daemons are known to be vulnerable:
IRCD-Hybrid ircd-hybrid 7.0.1 ircd-ratbox ircd-ratbox 1.5.1 ircd-ratbox ircd-ratbox 2.0 rc6

Solution

Upgrade to ircd-ratbox 1.5.2 and 2.0rc7 or IRCD-Hybrid 7.0.2.

See Also

https://seclists.org/bugtraq/2004/Jun/304

Plugin Details

Severity: Medium

ID: 14253

File Name: ircd_rate_limiting.nasl

Version: 1.16

Type: remote

Published: 8/10/2004

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 6/18/2004

Reference Information

CVE: CVE-2004-0605

BID: 10572

CWE: 16