A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people or malicious users to cause a DoS (Denial of Service).
The vulnerability is caused due to an input validation error in the processing of LDAP requests. This can be exploited to cause a vulnerable system to stop responding and automatically restart via a specially crafted LDAP packet sent to the Active Directory Application Mode (ADAM), Active Directory, or AD LDS server.
Successful exploitation requires valid logon credentials on Windows XP Professional, Windows Server 2003, and Windows Server 2008.
NOTE: Active Directory Application Mode (ADAM) is not enabled upon installation.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: Microsoft Windows Active Directory LDAP Request Processing Denial of Service
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.