LDAP: Microsoft Windows Active Directory Crafted LDAP Request Denial of Service

There exists a denial of service vulnerability in Microsoft Windows Active Directory. The flaw is caused by improper handling of LDAP requests. An unauthenticated remote attacker may exploit this vulnerability by sending a specially crafted LDAP message to the target host, causing the target server to temporarily stop responding. Temporary non-responsive or degraded performance effect may be observed on the target system after processing the crafted LDAP message. If the attack is mounted continuously, a permanent denial-of-service condition could be created.

Extended Description

Microsoft Windows is prone to a remote denial-of-service vulnerability because Microsoft Active Directory fails to handle specially crafted Lightweight Directory Access Protocol (LDAP) requests. An attacker can exploit this issue to cause the affected application to stop responding, denying further service to legitimate users.

Affected Products

Avaya messaging_application_server,Microsoft windows_2000_server

References

BugTraq: 24796

CVE: CVE-2007-3028

Short Name
LDAP:AD-CONVERT-ATT
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
LDAP
Keywords
Active CVE-2007-3028 Crafted Denial Directory LDAP Microsoft Request Service Windows bid:24796 of
Release Date
10/13/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Avaya

Microsoft

CVSS Score

5.0

Found a potential security threat?