![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.10119 |
Category: | Denial of Service |
Title: | NT IIS Malformed HTTP Request Header DoS Vulnerability |
Summary: | NOSUMMARY |
Description: | Description: It was possible to crash the remote web server by sending a malformed header request, like : GET / HTTP/1.1 Host: aaaaaaaaaaaa... (200 bytes) Host: aaaaaaaaaaaa... (200 bytes) ... 10,000 lines ... Host: aaaaaaaaaaaa... (200 bytes) This flaw allows an attacker to shut down your webserver, thus preventing legitimate users from connecting to your web server. Solution : See http://www.microsoft.com/technet/security/bulletin/ms99-029.mspx if you are using IIS. Or else, contact the vendor of your web server and notify it of this flaw. Risk factor : High Bugtraq Id : 579 |
Cross-Ref: |
BugTraq ID: 579 Common Vulnerability Exposure (CVE) ID: CVE-1999-0867 http://www.securityfocus.com/bid/579 Computer Incident Advisory Center Bulletin: J-058 http://www.ciac.org/ciac/bulletins/j-058.shtml Microsoft Security Bulletin: MS99-029 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-029 Microsoft Knowledge Base article: Q238349 http://support.microsoft.com/default.aspx?scid=kb;[LN];Q238349 XForce ISS Database: http-iis-malformed-header |
Copyright | This script is Copyright (C) 1999 Renaud Deraison |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |