First published: Wed Feb 10 2016(Updated: )
Network Policy Server (NPS) in Microsoft Windows Server 2008 SP2 and R2 SP1 and Server 2012 Gold and R2 misparses username queries, which allows remote attackers to cause a denial of service (RADIUS authentication outage) via crafted requests, aka "Network Policy Server RADIUS Implementation Denial of Service Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | =gold | |
Microsoft Windows Server | =r2 | |
Microsoft Windows Server | =r2 | |
Microsoft Windows Server | =r2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0050 has been rated as Important severity by Microsoft.
To remediate CVE-2016-0050, apply the security updates provided in Microsoft's MS16-021 bulletin.
CVE-2016-0050 affects Microsoft Windows Server 2008 SP2, R2 SP1, and Windows Server 2012 Gold and R2.
CVE-2016-0050 allows remote attackers to perform denial of service attacks against RADIUS authentication.
CVE-2016-0050 is considered a remote vulnerability, allowing attackers to exploit it over the network.