WinGate DNS Compressed Name Pointer DoS

This script is Copyright (C) 2006-2016 Tenable Network Security, Inc.

Synopsis :

The remote proxy is affected by a denial of service vulnerability.

Description :

The remote host appears to be running WinGate, a Windows application
for managing and securing Internet access.

The version of WinGate installed on the remote host contains a flaw
involving the processing of DNS requests with compressed name
pointers. By sending a specially crafted DNS request to a UDP port on
which WinGate is listening, an unauthenticated, remote attacker can
cause the affected application to consume 100% of the available CPU,
thereby denying service to legitimate users.

See also :

Solution :

Upgrade to WinGate 6.2.0 or later.

Risk factor :

Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.1
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 23732 ()

Bugtraq ID: 21295

CVE ID: CVE-2006-4518

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now