-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2015.0089
       Vulnerability in Network Policy Server RADIUS Implementation
                  Could Cause Denial of Service (3014029)
                              14 January 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Microsoft Windows
Publisher:         Microsoft
Operating System:  Windows Server 2003
                   Windows Server 2008
                   Windows Server 2008 R2
                   Windows Server 2012
                   Windows Server 2012 R2
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2015-0015  

Original Bulletin: 
   https://technet.microsoft.com/en-us/library/security/MS15-007

- --------------------------BEGIN INCLUDED TEXT--------------------

Microsoft Security Bulletin MS15-007 - Important

Vulnerability in Network Policy Server RADIUS Implementation Could Cause 
Denial of Service (3014029)

Published: January 13, 2015

Version: 1.0

Executive Summary

This security update resolves a privately reported vulnerability in Microsoft
Windows. The vulnerability could allow denial of service on an Internet 
Authentication Service (IAS) or Network Policy Server (NPS) if an attacker 
sends specially crafted username strings to the IAS or NPS. Note that the 
denial of service vulnerability would not allow an attacker to execute code or
to elevate user rights; however, it could prevent RADIUS authentication on the
IAS or NPS.

This security update is rated Important for all supported editions of Windows
Server 2003, Windows Server 2008 (excluding Itanium), Windows Server 2008 R2 
(excluding Itanium), Windows Server 2012, and Windows Server 2012 R2.

Affected Software

Windows Server 2003 Service Pack 2

Windows Server 2003 x64 Edition Service Pack 2

Windows Server 2003 with SP2 for Itanium-based Systems

Windows Server 2008 for 32-bit Systems Service Pack 2

Windows Server 2008 for x64-based Systems Service Pack 2

Windows Server 2008 R2 for x64-based Systems Service Pack 1

Windows Server 2012

Windows Server 2012 R2

Vulnerability Information

Network Policy Server RADIUS Implementation Denial of Service Vulnerability -
CVE-2015-0015

This is a denial of service vulnerability. An unauthenticated attacker who 
successfully exploited this vulnerability could send specially crafted 
username strings to an Internet Authentication Service (IAS) or Network Policy
Server (NPS), causing a denial of service condition for RADIUS authentication
on the IAS or NPS. Note that the denial of service vulnerability would not 
allow an attacker to execute code or to elevate user rights; however, it could
prevent RADIUS authentication on the IAS or NPS. An attacker who successfully
exploited the vulnerability could cause the target system to stop responding.
Network Policy Servers that allow remote, untrusted users to authenticate are
at particular risk from this vulnerability. The update addresses the denial of
service vulnerability by changing how Network Policy Servers parse username 
queries when implementing RADIUS.

Microsoft received information about this vulnerability through coordinated 
vulnerability disclosure. When this security bulletin was issued, Microsoft 
had not received any information to indicate that this vulnerability had been
publicly used to attack customers.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=wC1n
-----END PGP SIGNATURE-----