File: 1200.txt

package info (click to toggle)
snort 2.9.15.1-5
  • links: PTS, VCS
  • area: main
  • in suites: bullseye
  • size: 59,656 kB
  • sloc: ansic: 310,441; sh: 13,260; makefile: 2,943; yacc: 497; perl: 496; lex: 261; sed: 14
file content (61 lines) | stat: -rw-r--r-- 1,177 bytes parent folder | download | duplicates (8)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
Rule:

--
Sid:
1200

--
Summary:
This event is generated when an invalid URL response is sent from a
webserver to a client.

--
Impact:
Information gathering and possible Denial of Service (DoS).

--
Detailed Information:
This event is generated when an invalid URL response is sent from a
webserver to a client. It is possible under some circumstances, to cause
a DoS condition by supplying an invalid URL to a web server running an
affected version of Microsoft IIS 4.0. Certain invalid URLs can cause
the system to make an invalid memory request that will in turn stop the
IIS service from running.

--
Affected Systems:
	Microsoft IIS 4.0 on NT systems
	
--
Attack Scenarios:
The attacker would merely need to make a web request using an invalid
URL.

--
Ease of Attack:
Simple. No exploit software required.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Upgrade the system to the latest non-affected version of the software.

Apply the appropriate vendor supplied patches.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

--