Remote DoS attack in Networks Associates PGP Certificate Server Version 2.5 Vulnerability



PGP Certificate Server


USSR Advisory Code:   USSR-2000044

Release Date:
June 14, 2000

Systems Affected:
PGP Certificate Server Version 2.5.0 *Solaris/Windows*
PGP Certificate Server Version 2.5.1 *Solaris/Windows*


The Ussr Labs team has recently discovered a null memory problem in the PGP Certificate Server, 

The issue we found is if anyone connect to the PGP Certificate Server Command Port (used for manage Server operations) 
default (Port 4000) and the server is unable to resolve your IP address to a host name it will cause the process containg 
the services to crash.

SPECIAL NOTE: That we take no responsibility for this code it is for educational purposes only.

Denied all the ways to resolve you ip to hostname and connect to port 4000 in the server.

the process containg the services crash, and you will see something like this in the server 

Vendor Status:  
Informed!, Contacted!.

Network Associates has released a patch for this vulnerability.
Users should contact Network Associates Technical Support at 1-800-722-3709
for information.

Vendor   Url:
Program  Url:

Related Links:

Underground Security Systems Research

Eeye, Attrition, w00w00, beavuh, Rhino9,, ADM, HNN, Technotronic and Wiretrip.

Copyright (c) 1999-2000 Underground Security Systems Research.
Permission is hereby granted for the redistribution of this alert electronically. It is not to be edited in any 
way without express consent of Ussr. If you wish to reprint the whole or any part of this alert in any other 
medium excluding electronic medium, please e-mail for permission.

The information within this paper may change without notice. Use of this information constitutes acceptance for 
use in an AS IS condition. There are NO warranties with regard to this information. In no event shall the author 
be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. 
Any use of this information is at the user's own risk.

Please send suggestions, updates, and comments to:

Underground Security Systems Research