File: 100000178.txt

package info (click to toggle)
snort 2.9.7.0-5
  • links: PTS, VCS
  • area: main
  • in suites: buster, sid, stretch
  • size: 55,000 kB
  • ctags: 38,464
  • sloc: ansic: 266,667; sh: 12,508; makefile: 2,908; yacc: 497; perl: 496; lex: 261; sed: 14
file content (60 lines) | stat: -rw-r--r-- 1,109 bytes parent folder | download | duplicates (4)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
Rule: 

--
Sid: 
100000178

-- 
Summary: 
This event is generated when an attempt is made to exploit a known 
vulnerability in the Hasbani Web server.

-- 
Impact: 
Denial of Service (DoS).

--
Detailed Information:
A vulnerability exists in the Hasbani web server that may allow an attacker to 
initiate a DoS condition on the server. Poor programming in the web server may 
result in the server entering an endless loop when processing malformed GET 
requests. This can lead to an exhaustion of system resources and a DoS 
condition.

--
Affected Systems:
Hasbani web server 2.0

--
Attack Scenarios: 
An attacker can supply a malformed GET request to the web server to cause the 
DoS. Alternately, exploit code exists for this vulnerability.

-- 
Ease of Attack: 
Simple. Exploits exists.

-- 
False Positives:
None Known.

--
False Negatives:
None Known.

-- 
Corrective Action: 
Use Apache.

--
Contributors:
Original Rule writer rmkml <rmkml@free.fr>
Sourcefire Vulnerability Research Team
Alex Kirk <akirk@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

-- 
Additional References:


--