[Am-info] Microsoft IIS False Content-Length Field DoS Vulnerability
Fred A. Miller
fm@cupserv.org
Mon, 17 Dec 2001 17:23:55 -0500
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Microsoft IIS False Content-Length Field DoS Vulnerability
BugTraq ID: 3667
Remote: Yes
Date Published: Dec 11 2001 12:00A
Relevant URL:
http://www.securityfocus.com/bid/3667
Summary:
Microsoft IIS 5.0 may be prone to a denial of service condition when
sent a specially crafted malformed HTTP GET header.
If an IIS 5.0 web server is sent a crafted HTTP GET request which
contains a falsified and excessive "Content-Length" field, it behaves
in an unusual manner. The server keeps the connection open and does not
time out, but does not respond otherwise. It is possible that this may
be used to cause a denial of service to the web server.
If this unexpected behavior can somehow be exploited to cause a denial
of service, then the server will need to be restarted to regain normal
functionality.
- --
Fred A. Miller
Systems Administrator
Cornell Univ. Press Services
fm@cupserv.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQE8HnB7IhTtc6nTZIIRAgEhAJ4u2Rzh1E50h2qbBDPMeLOlXkMnhwCggcbt
NVlsRehUW5f2jaBULMwM0vo=
=nGPv
-----END PGP SIGNATURE-----