Fastream NETFile FTP/Web Server HEAD Request Saturation DoS

medium Nessus Plugin ID 15764

Synopsis

The remote web server is prone to a denial of service attack.

Description

The remote host appears to be running FastStream NETFile Server version 7.1 or older. These versions do not close the connection when an HTTP HEAD request is received with the keep-alive option set. An attacker may exploit this flaw by sending multiple HEAD requests to the remote host, thus consuming all its file descriptors until it does not accept connections any more.

Solution

Upgrade to version 7.1.3 or later.

See Also

http://users.pandora.be/bratax/advisories/b003.html

Plugin Details

Severity: Medium

ID: 15764

File Name: faststream_head_dos.nasl

Version: 1.14

Type: remote

Family: Web Servers

Published: 11/19/2004

Updated: 7/11/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 11/15/2004

Reference Information

CVE: CVE-2004-2534

BID: 11687