Web Server HTTP 1.1 Header Remote Overflow

This script is Copyright (C) 2002-2014 Tenable Network Security, Inc.

Synopsis :

Arbitrary code may be run on the remote server.

Description :

It was possible to kill the web server by sending an invalid request
with a too long HTTP 1.1 header (Accept-Encoding, Accept-Language,
Accept-Range, Connection, Expect, If-Match, If-None-Match, If-Range,
If-Unmodified-Since, Max-Forwards, TE, Host).

This vulnerability could be exploited to crash the web server. It
might even be possible to execute arbitrary code on your system.

** As this is a generic test, it is not possible to know if the impact
** is limited to a denial of service.

Solution :

Upgrade your web server or protect it with a filtering reverse proxy

Risk factor :

High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : true

Family: Web Servers

Nessus Plugin ID: 11129 ()

Bugtraq ID: 6951

CVE ID: CVE-2003-0180

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now