Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:OVERFLOW:ATP-HTTPD-OF

Severity

Critical

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

atphttpd http overflow linux redhat debian

Release Date

2003/10/01

Update Number

1213

Supported Platforms

di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: ATPhttpd Buffer Overflow


This signature detects attempts to exploit a known vulnerability against ATPhttp versions 0.4b and earlier. Attackers can send an overly long GET request to the Web server daemon to overflow the buffer and create a denial of service condition.

Extended Description

Athttpd is said to be prone to a remote buffer overrun that could allow an attacker to execute arbitrary code. The problem occurs due to insufficient bounds checking when handling GET requests. As a result, an attacker may be capable of overrunning the bounds of an internal memory buffer and effectively control the flow of execution.

Affected Products

  • athttpd 0.4.0 b

References

  • BugTraq: 8709
  • URL: http://www.security.nnov.ru/search/news.asp?binid=1626

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out