WinGate DNS Compressed Name Pointer DoS

Medium Nessus Plugin ID 23732


The remote proxy is affected by a denial of service vulnerability.


The remote host appears to be running WinGate, a Windows application for managing and securing Internet access.

The version of WinGate installed on the remote host contains a flaw involving the processing of DNS requests with compressed name pointers. By sending a specially crafted DNS request to a UDP port on which WinGate is listening, an unauthenticated, remote attacker can cause the affected application to consume 100% of the available CPU, thereby denying service to legitimate users.


Upgrade to WinGate 6.2.0 or later.

See Also

Plugin Details

Severity: Medium

ID: 23732

File Name: wingate_620.nasl

Version: $Revision: 1.16 $

Type: local

Agent: windows

Family: Windows

Published: 2006/11/27

Modified: 2016/11/02

Dependencies: 13855

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2006/11/26

Reference Information

CVE: CVE-2006-4518

BID: 21295

OSVDB: 30691