Web Server HTTP Method Handling Remote Overflow

high Nessus Plugin ID 11065

Synopsis

The remote host is running a web server with a remote buffer overflow vulnerability.

Description

It was possible to kill the web server by sending an invalid request with a long HTTP method field. A remote attacker may exploit this vulnerability to make the web server crash continually or possibly execute arbitrary code.

Solution

Upgrade your software or protect it with a filtering reverse proxy.

See Also

https://seclists.org/bugtraq/2002/Jul/329

Plugin Details

Severity: High

ID: 11065

File Name: www_too_long_method.nasl

Version: 1.35

Type: remote

Family: Web Servers

Published: 8/6/2002

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 7/28/2003

Reference Information

CVE: CVE-2002-1061

BID: 5319