FreeBSD : hiawatha -- integer overflow in Content-Length header parsing (b13414c9-50ba-11e0-975a-000c29cc39d3)

high Nessus Plugin ID 52707

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Hugo Leisink reports :

A bug has been found in version 7.4 of the Hiawatha webserver, which could lead to a server crash. This is caused by an integer overflow in the routine that reads the HTTP request. A too large value of the Content-Length HTTP header results in an overflow.

Solution

Update the affected package.

See Also

https://www.hiawatha-webserver.org/weblog/16

http://www.nessus.org/u?2f5fae0e

http://www.nessus.org/u?3dd47cb3

https://seclists.org/bugtraq/2011/Mar/65

http://www.nessus.org/u?430bb416

Plugin Details

Severity: High

ID: 52707

File Name: freebsd_pkg_b13414c950ba11e0975a000c29cc39d3.nasl

Version: 1.10

Type: local

Published: 3/18/2011

Updated: 1/6/2021

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:hiawatha, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 3/17/2011

Vulnerability Publication Date: 2/25/2011

Reference Information

Secunia: 43660