Secunia Security Advisory - Wernfried Haas has reported a vulnerability in Centericq, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).
9f4c05173dfc501411c15c22d0fa8fa7639c47c7ff3266f75809532cd6c52bc3
TITLE:
Centericq Empty Packet Denial of Service Weakness
SECUNIA ADVISORY ID:
SA17798
VERIFY ADVISORY:
http://secunia.com/advisories/17798/
CRITICAL:
Not critical
IMPACT:
DoS
WHERE:
>From remote
SOFTWARE:
Centericq 4.x
http://secunia.com/product/5327/
DESCRIPTION:
Wernfried Haas has reported a vulnerability in Centericq, which
potentially can be exploited by malicious people to cause a DoS
(Denial of Service).
The weakness is caused due to an error in the packet handling for
peer to peer communications in the "DirectClient" class. This can be
exploited to crash a vulnerable client by sending an empty packet to
the listening port.
Successful exploitation requires that the setting "Enable
peer-to-peer communications" has been enabled.
SOLUTION:
Disable the "Enable peer-to-peer communications" setting. This may
however affect functionality.
PROVIDED AND/OR DISCOVERED BY:
Wernfried Haas
ORIGINAL ADVISORY:
http://www.debian.org/security/2005/dsa-912
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------