|
Family: Denial of Service --> Category: denial
AnalogX denial of service by long CGI name Vulnerability Scan
Vulnerability Scan Summary Crash the remote HTTP service
Detailed Explanation for this Vulnerability Test
It was possible to crash the remote service by requesting
a URL with too many characters following the /cgi-bin/
directory. For example:
http://www.YOURSERVER.com/cgi-bin/TOO-MANY-CHARACTERS
where 'TOO-MANY-CHARACTERS' represents a random string of
8,000 characters.
Solution : Upgrade your web server to the latest version, or consider
an alternate web server, such as Apache (http://www.apache.org).
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|