Family: Denial of Service --> Category: infos
FastStream Web Server HEAD DoS Vulnerability Scan
Vulnerability Scan Summary
Checks for version of FastStream NetFile
Detailed Explanation for this Vulnerability Test
The remote host is running a version of the FastStream Web server
which is older or as old as version 7.1.
The remote version of this software does not close the connection when
an HTTP HEAD request is received with the keep-alive option set. A possible hacker
may exploit this flaw by sending multiple HEAD requests to the remote host,
thus consuming all its file descriptors until it does not accept connections
See also : http://users.pandora.be/bratax/advisories/b003.html
Solution : Upgrade to the newest version of this software
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.