Short Name |
LDAP:AD-CONVERT-ATT |
---|---|
Severity |
Medium |
Recommended |
No |
Recommended Action |
Drop |
Category |
LDAP |
Keywords |
Microsoft Windows Active Directory Crafted LDAP Request Denial of Service |
Release Date |
2010/10/13 |
Update Number |
1791 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
There exists a denial of service vulnerability in Microsoft Windows Active Directory. The flaw is caused by improper handling of LDAP requests. An unauthenticated remote attacker may exploit this vulnerability by sending a specially crafted LDAP message to the target host, causing the target server to temporarily stop responding. Temporary non-responsive or degraded performance effect may be observed on the target system after processing the crafted LDAP message. If the attack is mounted continuously, a permanent denial-of-service condition could be created.
Microsoft Windows is prone to a remote denial-of-service vulnerability because Microsoft Active Directory fails to handle specially crafted Lightweight Directory Access Protocol (LDAP) requests. An attacker can exploit this issue to cause the affected application to stop responding, denying further service to legitimate users.