WinGate DNS Compressed Name Pointer DoS

This script is Copyright (C) 2006-2016 Tenable Network Security, Inc.


Synopsis :

The remote proxy is affected by a denial of service vulnerability.

Description :

The remote host appears to be running WinGate, a Windows application
for managing and securing Internet access.

The version of WinGate installed on the remote host contains a flaw
involving the processing of DNS requests with compressed name
pointers. By sending a specially crafted DNS request to a UDP port on
which WinGate is listening, an unauthenticated, remote attacker can
cause the affected application to consume 100% of the available CPU,
thereby denying service to legitimate users.

See also :

http://www.nessus.org/u?034616cf
http://seclists.org/fulldisclosure/2006/Nov/396
http://forums.qbik.com/viewtopic.php?t=4215

Solution :

Upgrade to WinGate 6.2.0 or later.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 4.1
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 23732 ()

Bugtraq ID: 21295

CVE ID: CVE-2006-4518

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now