Fastream NETFile FTP/Web Server HEAD Request Saturation DoS

Medium Nessus Plugin ID 15764


The remote web server is prone to a denial of service attack.


The remote host appears to be running FastStream NETFile Server version 7.1 or older. These versions do not close the connection when an HTTP HEAD request is received with the keep-alive option set. An attacker may exploit this flaw by sending multiple HEAD requests to the remote host, thus consuming all its file descriptors until it does not accept connections any more.


Upgrade to version 7.1.3 or later.

See Also

Plugin Details

Severity: Medium

ID: 15764

File Name: faststream_head_dos.nasl

Version: $Revision: 1.13 $

Type: remote

Family: Web Servers

Published: 2004/11/19

Modified: 2011/03/17

Dependencies: 10107

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:H/RL:U/RC:ND

Vulnerability Information

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 2004/11/15

Reference Information

CVE: CVE-2004-2534

BID: 11687

OSVDB: 12101