HTTP 1.0 header overflow

Published: 2005-11-03 13:08:04

CVSS Base Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Detection Type:
Remote Vulnerability

Recommendations:
Upgrade your software or protect it with a filtering reverse proxy

Solution Type:
Vendor Patch

Summary:
It was possible to kill the web server by sending an invalid request with a too long header (From, If-Modified-Since, Referer or Content-Type) A cracker may exploit this vulnerability to make your web server crash continually or even execute arbitrary code on your system.

Search
Severity
High
CVSS Score
7.5

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.