Fortinet Discovers Teradata Gateway Remote DoS Vulnerability
Fortinet's FortiGuard Labs has discovered a critical denial of service (DoS) vulnerability in Teradata tgtw and TDExpress.
Teradata is a leading provider of powerful enterprise big data analytics and services that include Data Warehousing, Data Driven Marketing, BI and CRM.
A remote DoS vulnerability exists in Teradata tgtw and TDExpress. This vulnerability is caused due to insufficient validation on a malformed CONFIG REQUEST message, which can subsequently cause a database crash. A malicious user could, therefore, craft a malformed request message that results in a denial of service.
FortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:
Jul 20, 2015
The vendor has fixed them in following versions:
Authentication is not required to exploit this DoS vulnerability. So its severity is very high due to the high exploitability.
This vulnerability was discovered by Honggang Ren of Fortinet's FortiGuard Labs.
Fortinet customers who subscribe to Fortinet's intrusion prevention (IPS) service should be protected against this vulnerability with the appropriate configuration parameters in place. Fortinet's IPS service is one component of FortiGuard Subscription Services, which also offer comprehensive solutions such as antivirus, Web content filtering and antispam capabilities. These services enable protection against threats on both application and network layers. FortiGuard Services are continuously updated by FortiGuard Labs, which enables Fortinet to deliver a combination of multi-layered security intelligence and true zero-day protection from new and emerging threats. These updates are delivered to all FortiGate, FortiMail and FortiClient products. Fortinet strictly follows responsible disclosure guidelines to ensure optimum protection during a threat's lifecycle.