A vulnerability in UDP-based application protocols allows unauthenticated attackers to create network loops using spoofed packets, leading to Denial-of-Service (DoS) or resource abuse. Affected protocols include DNS, NTP, TFTP, Echo, Chargen, and QOTD. The attack involves triggering an endless loop of error messages between vulnerable servers. The impact can range from service instability to network outages and amplification attacks. Recommended solutions include applying vendor patches, protecting UDP applications with firewalls and access controls, disabling unused services, deploying anti-spoofing techniques, and enforcing network rate-limiting. Service providers should implement QoS to protect against network loop abuse. The vulnerability was discovered by researchers at CISPA Helmholtz Center for Information Security.
kb.cert.org
kb.cert.org
Create attached notes ...
