|
Family: Denial of Service --> Category: destructive_attack
Multiple IRC daemons Dequeuing DoS Vulnerability Scan
Vulnerability Scan Summary Multiple IRC daemons Dequeuing DoS check
Detailed Explanation for this Vulnerability Test
The remote host is running a version of ircd which is vulnerable
to a rate-limiting Denial of Service (DoS) attack. The flaw is
in the fact that the IRCD daemon reserves more than 500 bytes of
memory for each line received.
A possible hacker, exploiting this flaw, would need network access to the
IRC server. A successful attack would render the IRC daemon, and
possibly the entire system, unusable.
The following IRC daemons are known to be vulnerable:
IRCD-Hybrid ircd-hybrid 7.0.1
ircd-ratbox ircd-ratbox 1.5.1
ircd-ratbox ircd-ratbox 2.0 rc6
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|