Check Point Reference: | CPAI-2006-039 |
Date Published: | 15 Sep 2010 |
Severity: | Critical |
Last Updated: | Monday 14 July, 2014 |
Source: | |
Industry Reference: | CVE-2006-0647 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | Sun Directory Server is a distributed directory server based on the Lightweight Directory Access Protocol (LDAP). The server listens for LDAP requests on a port specified during installation. The default port assigned to the server during installation is randomly selected. There exists a vulnerability in the Sun Directory Server. The flaw is caused due to improper handling of certain overly large LDAP messages. An unauthenticated remote attacker may exploit this vulnerability by sending a crafted LDAP message to the target host which may terminate the affected LDAP server on the target system. The target server process will terminate as a result of an attack. Consequently, all established connections will be disconnected and further connections will not be possible until the server is manually restarted. |
This protection will detect and block malformed LDAP packets.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: LDAP Protection Violation.
Attack Information: Sun Directory Server LDAP Denial of Service