LDAPNightmare PoC Exploit Crashes LSASS and Reboots Windows Domain Controllers
Jan 03, 2025
Windows Server / Threat Mitigation
 A proof-of-concept (PoC) exploit has been released  for a now-patched security flaw impacting Windows Lightweight Directory Access Protocol (LDAP) that could trigger a denial-of-service (DoS) condition.  The out-of-bounds reads vulnerability is tracked as CVE-2024-49113  (CVSS score: 7.5). It was addressed by Microsoft as part of Patch Tuesday updates for December 2024, alongside CVE-2024-49112  (CVSS score: 9.8), a critical integer overflow flaw in the same component that could result in remote code execution.  Credited with discovering and reporting both vulnerabilities is independent security researcher Yuki Chen ( @guhe120 ).   The CVE-2024-49113 PoC devised  by SafeBreach Labs, codenamed LDAPNightmare , is designed to crash any unpatched Windows Server "with no pre-requisites except that the DNS server of the victim DC has Internet connectivity."   Specifically, it entails sending a DCE/RPC request to the victim server, ultimately causing the Local Security Authority Su...