Short Name |
DOS:UPNP-CHARGEN-DOS |
---|---|
Severity |
Medium |
Recommended |
No |
Recommended Action |
Drop |
Category |
DOS |
Keywords |
NOTIFY Request Denial of Service |
Release Date |
2003/04/22 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability against the UPNP service for Microsoft Windows XP. Attackers can send a malicious NOTIFY request that forces the UPNP daemon to connect to a malicious CHARGEN-like service on the sending host (the attacker's machine); thereby causing a denial-of-service condition by allowing the UPNP daemon to consume all available memory and CPU resources.
Universal Plug and Play, or UPnP, is a service that allows for hosts to locate and use devices on the local network. UPnP support ships with Windows XP and ME. For Windows 98 and 98SE, it is available with Windows XP's Internet Connection Sharing client. The Simple Service Discovery Protocol (SSDP) is a component of UPnP that allows a system to enumerate the resources of a newly installed network device on a UPnP network. This service is vulnerable to a denial of service condition by constructing a UDP packet directed at a UPnP-enabled system which directs the system to an echoed port, the system would enter into an endless download cycle. This vulnerability could possibly be used to launch a distributed denial of service attack by directing several UPnP-enabled systems at a third party.