Check Point Advisories

Sun Directory Server LDAP Denial of Service (CVE-2006-0647)

Check Point Reference: CPAI-2006-039
Date Published: 15 Sep 2010
Severity: Critical
Last Updated: Monday 14 July, 2014
Source:
Industry Reference:CVE-2006-0647
Protection Provided by:

Security Gateway
R81, R80, R77, R75

Who is Vulnerable?
Vulnerability Description Sun Directory Server is a distributed directory server based on the Lightweight Directory Access Protocol (LDAP). The server listens for LDAP requests on a port specified during installation. The default port assigned to the server during installation is randomly selected. There exists a vulnerability in the Sun Directory Server. The flaw is caused due to improper handling of certain overly large LDAP messages. An unauthenticated remote attacker may exploit this vulnerability by sending a crafted LDAP message to the target host which may terminate the affected LDAP server on the target system. The target server process will terminate as a result of an attack. Consequently, all established connections will be disconnected and further connections will not be possible until the server is manually restarted.

Protection Overview

This protection will detect and block malformed LDAP packets.

In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.

Security Gateway R80 / R77 / R75

  1. In the IPS tab, click Protections and find the Sun Directory Server LDAP Denial of Service protection using the Search tool and Edit the protection's settings.
  2. Install policy on all Security Gateways.

This protection's log will contain the following information:

Attack Name:  LDAP Protection Violation.
Attack Information:  Sun Directory Server LDAP Denial of Service

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK