Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Denial of Service >> Multiple IRC daemons Dequeuing DoS


Vulnerability Assessment Details

Multiple IRC daemons Dequeuing DoS

Vulnerability Assessment Summary
Multiple IRC daemons Dequeuing DoS check

Detailed Explanation for this Vulnerability Assessment

The remote host is running a version of ircd which is vulnerable
to a rate-limiting Denial of Service (DoS) attack. The flaw is
in the fact that the IRCD daemon reserves more than 500 bytes of
memory for each line received.

A possible hacker, exploiting this flaw, would need network access to the
IRC server. A successful attack would render the IRC daemon, and
possibly the entire system, unusable.

The following IRC daemons are known to be vulnerable:
IRCD-Hybrid ircd-hybrid 7.0.1
ircd-ratbox ircd-ratbox 1.5.1
ircd-ratbox ircd-ratbox 2.0 rc6

Network Security Threat Level: High

Networks Security ID: 10572

Vulnerability Assessment Copyright: This script is Copyright (C) 2004-2007 Tenable Network Security

Cables, Connectors

Vintage digital DEC pdp11 Pocket Computer Programming Card July 1975
$20.0
Vintage digital DEC pdp11 Pocket Computer Programming Card July 1975 pictureVT320-A2 VINTAGE DEC VIDEO TERMINAL WITH LK201 KEYBOARD
$149.0
VT320-A2 VINTAGE DEC VIDEO TERMINAL WITH LK201 KEYBOARD pictureVintage DEC Digital M8210 Mos Memory Array Untested - 5013241C-P1
$40.49
Vintage DEC Digital  M8210 Mos Memory Array Untested - 5013241C-P1 pictureVintage DEC 8 Inch Floppy Game and Systems Disk Used
$39.0
Vintage DEC 8 Inch Floppy Game and Systems Disk Used picture


Discussions

No Discussions have been posted on this vulnerability.