-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Remote DoS attack in Networks Associates PGP Certificate Server Version 2.5 Vulnerability USSR Advisory Code: USSR-2000044 Release Date: June 13, 2000 Systems Affected: PGP Certificate Server Version 2.5.0 *Solaris/Windows* PGP Certificate Server Version 2.5.1 *Solaris/Windows* THE PROBLEM The Ussr Labs team has recently discovered a null memory problem in the PGP Certificate Server, The issue we found is if anyone connect to the PGP Certificate Server Command Port (used for manage Server operations) default (Port 4000) and the server is unable to resolve your IP address to a host name it will cause the process containg the services to crash. SPECIAL NOTE: That we take no responsibility for this code it is for educational purposes only. Example: Denied all the ways to resolve you ip to hostname and connect to port 4000 in the server. the process containg the services crash and you will see something like this in the server http://www.ussrback.com/pgpbug.jpg Vendor Status: Informed!, Contacted!. Fix: Network Associates has released a patch for this vulnerability. Users should contact Network Associates Technical Support at 1-800-722-3709 for information. Vendor Url: http://www.nai.com Program Url: http://www.pgp.com/asp_set/products/tns/pgpcert_intro.asp Related Links: Underground Security Systems Research http://www.ussrback.com Greetings: Eeye, Attrition, w00w00, beavuh, Rhino9, SecurityFocus.com, ADM, HNN, Technotronic and Wiretrip. Copyright (c) 1999-2000 Underground Security Systems Research. Permission is hereby granted for the redistribution of this alert electronically. It is not to be edited in any way without express consent of Ussr. If you wish to reprint the whole or any part of this alert in any other medium excluding electronic medium, please e-mail labs@ussrback.com for permission. Disclaimer: The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk. Feedback: Please send suggestions, updates, and comments to: Underground Security Systems Research mail:labs@ussrback.com http://www.ussrback.com -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 6.5.2 for non-commercial use iQA/AwUBOUd2YK3JcbWNj6DDEQKQzgCgk3D9MNRRF24bRPBZpQxKoORM/H4AoNsu TX6tMjyJFKGMffXF76ZaQ8Y7 =TKb0 -----END PGP SIGNATURE-----