RADIUS: Username Authentication Bypass

This signature detects attempts to exploit a know vulnerability against RADIUS Authentication Bypass protocol. This can lead to a remote execution of arbitrary code.

Extended Description

Microsoft Windows Server 2003 SP2, Server 2008 SP2 and R2 SP1, and Server 2012 Gold and R2 allow remote attackers to cause a denial of service (system hang and RADIUS outage) via crafted username strings to (1) Internet Authentication Service (IAS) or (2) Network Policy Server (NPS), aka "Network Policy Server RADIUS Implementation Denial of Service Vulnerability."

Affected Products

Microsoft windows_server_2008

References

BugTraq: 71933

CVE: CVE-2015-0015

Short Name
RADIUS:USR-AUTHENTICATION
Severity
Major
Recommended
True
Recommended Action
Drop
Category
RADIUS
Keywords
Authentication Bypass CVE-2015-0015 Username bid:71933
Release Date
01/13/2015
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3761
False Positive
Unknown
Vendors

Microsoft

CVSS Score

7.8

Found a potential security threat?