UPNP: NOTIFY Request Denial of Service
This signature detects attempts to exploit a known vulnerability against the UPNP service for Microsoft Windows XP. Attackers can send a malicious NOTIFY request that forces the UPNP daemon to connect to a malicious CHARGEN-like service on the sending host (the attacker's machine); thereby causing a denial-of-service condition by allowing the UPNP daemon to consume all available memory and CPU resources.
Extended Description
Universal Plug and Play (UPnP) on Windows 98, 98SE, ME, and XP allows remote attackers to cause a denial of service via (1) a spoofed SSDP advertisement that causes the client to connect to a service on another machine that generates a large amount of traffic (e.g., chargen), or (2) via a spoofed SSDP announcement to broadcast or multicast addresses, which could cause all UPnP clients to send traffic to a single target system.
Affected Products
Microsoft windows_98
References
BugTraq: 3724
CVE: CVE-2001-0877
URL: http://research.eeye.com/html/advisories/published/AD20011220.html http://www.kb.cert.org/vuls/id/951555
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Microsoft
5.0