Web Server HTTP 1.1 Header Remote Overflow

High Nessus Plugin ID 11129


Arbitrary code may be run on the remote server.


It was possible to kill the web server by sending an invalid request with a too long HTTP 1.1 header (Accept-Encoding, Accept-Language, Accept-Range, Connection, Expect, If-Match, If-None-Match, If-Range, If-Unmodified-Since, Max-Forwards, TE, Host).

This vulnerability could be exploited to crash the web server. It might even be possible to execute arbitrary code on your system.

** As this is a generic test, it is not possible to know if the impact
** is limited to a denial of service.


Upgrade your web server or protect it with a filtering reverse proxy

Plugin Details

Severity: High

ID: 11129

File Name: www_too_long_header11.nasl

Version: $Revision: 1.32 $

Type: remote

Family: Web Servers

Published: 2002/09/21

Modified: 2014/05/27

Dependencies: 10107, 10582

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 2003/02/17

Reference Information

CVE: CVE-2003-0180, CVE-2003-0181

BID: 6951

OSVDB: 10824, 10827