Vigil@nce - Windows: denial of service via IAS/NPS RADIUS
January 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can send a malicious login to IAS/NPS of Windows, in
order to trigger a denial of service on RADIUS.
Impacted products: Windows 2003, Windows 2008 R0, Windows 2008 R2,
Microsoft Windows 2012
Severity: 2/4
Creation date: 13/01/2015
DESCRIPTION OF THE VULNERABILITY
The IAS (Internet Authentication Service) or NPS (Network Policy
Server) service can be enabled on a Windows server.
Users have to authenticate using a login and a password, which are
sent to a RADIUS service. However, a malformed login blocks the
RADIUS service.
An attacker can therefore send a malicious login to IAS/NPS of
Windows, in order to trigger a denial of service on RADIUS.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Windows-denial-of-service-via-IAS-NPS-RADIUS-15957