Think you have a false positive on this rule?

Sid 1-33053

Summary:

    OS-WINDOWS Microsoft RADIUS Server invalid access-request username denial of service attempt

Impact:

    Confidentiality Impact: NONE Integrity Impact: NONE Availability Impact: COMPLETE

Detailed Information:

    Microsoft Windows Server 2003 SP2, Server 2008 SP2 and R2 SP1, and Server 2012 Gold and R2 allow remote attackers to cause a denial of service (system hang and RADIUS outage) via crafted username strings to (1) Internet Authentication Service (IAS) or (2) Network Policy Server (NPS), aka "Network Policy Server RADIUS Implementation Denial of Service Vulnerability."

Affected Systems:

    microsoft windows server 2012 r2 x64
    microsoft windows server 2003 sp2
    microsoft windows server 2008 r2 sp1
    microsoft windows server 2012 gold
    microsoft windows server 2008 sp2

Attack Scenarios:

    No data available

False Positives:

    None known

False Negatives:

    None known

Corrective Action:

    Upgrade to the latest non-affected version
    Apply vendor-provided patches

Contributors:

    No data available

Additional References: