Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Denial of Service >> Multiple IRC daemons Dequeuing DoS


Vulnerability Assessment Details

Multiple IRC daemons Dequeuing DoS

Vulnerability Assessment Summary
Multiple IRC daemons Dequeuing DoS check

Detailed Explanation for this Vulnerability Assessment

The remote host is running a version of ircd which is vulnerable
to a rate-limiting Denial of Service (DoS) attack. The flaw is
in the fact that the IRCD daemon reserves more than 500 bytes of
memory for each line received.

A possible hacker, exploiting this flaw, would need network access to the
IRC server. A successful attack would render the IRC daemon, and
possibly the entire system, unusable.

The following IRC daemons are known to be vulnerable:
IRCD-Hybrid ircd-hybrid 7.0.1
ircd-ratbox ircd-ratbox 1.5.1
ircd-ratbox ircd-ratbox 2.0 rc6

Network Security Threat Level: High

Networks Security ID: 10572

Vulnerability Assessment Copyright: This script is Copyright (C) 2004-2007 Tenable Network Security

Cables, Connectors

HP TouchSmart 15.6 Inch Touch Screen Laptop. 6GB Memory - 500 GB Hard Drive.
$315.0
HP TouchSmart 15.6 Inch Touch Screen Laptop. 6GB Memory - 500 GB Hard Drive.   picture AMD Firepro S7150 8gb passive video card NEW
$1900.0
 AMD Firepro S7150 8gb passive video card NEW pictureSamsung 2GB ( 2x1GB sticks) 2Rx8 PC2-5300E-555-12-G3 ECC DDR2 M391T2953EZ3-CE6
$11.99
Samsung 2GB ( 2x1GB sticks) 2Rx8 PC2-5300E-555-12-G3 ECC DDR2 M391T2953EZ3-CE6 pictureHP Pavilion DV5 DV5t-1000 Memory RAM Cover Door GRADE "B"
$19.99
HP Pavilion DV5 DV5t-1000 Memory RAM Cover Door GRADE


Discussions

No Discussions have been posted on this vulnerability.