exploit-db-mirror/exploits/multiple/dos/23181.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

10 lines
No EOL
696 B
Text

source: https://www.securityfocus.com/bid/8697/info
Null HTTPd has been reported prone to a remotely triggered denial of service vulnerability.
The issue has been reported to present itself in the HTTP POST handling routines within the Null HTTPd server. It has been reported that a remote attacker may make a malicious HTTP POST request, specifying a 'Content-Length' value in the HTTP header and then sending data that amounts to 1 byte less that the specified Content-Length. This will reportedly leave each connection on the server in an open state. An attacker can exploit this condition to trigger a denial of service of the affected server.
POST / HTTP/1.0
Content-Length: 10
123456789