Sympa Malformed Content-Type Header Remote DoS

medium Nessus Plugin ID 31726

Synopsis

The remote web server contains a Perl script that is prone to a denial of service attack.

Description

According to its banner, the version of Sympa installed on the remote host contains a flaw that causes sympa.pl to crash when sending a text digest if it encounters a message with a malformed Content-Type header.

Solution

Upgrade to Sympa 5.4 or later.

See Also

http://www.nessus.org/u?549c5035

http://www.sympa.org/distribution/latest-stable/NEWS

Plugin Details

Severity: Medium

ID: 31726

File Name: sympa_5_4.nasl

Version: 1.17

Type: remote

Family: CGI abuses

Published: 4/1/2008

Updated: 4/11/2022

Configuration: Enable paranoid mode, Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: cpe:/a:sympa:sympa

Required KB Items: Settings/ParanoidReport

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Reference Information

CVE: CVE-2008-1648

BID: 28539

CWE: 20

SECUNIA: 29575