Short Name |
HTTP:OVERFLOW:CONTENT-OVERFLOW |
---|---|
Severity |
High |
Recommended |
Yes |
Category |
HTTP |
Keywords |
http |
Release Date |
2003/08/27 |
Update Number |
1213 |
Supported Platforms |
di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This protocol anomaly triggers when the indicated length in the HTTP header Content-Length is exceeded by the length of the actual content data.
This signature detects a malformed HTTP message with an entity body having a length larger than what is specified in the Content-Length header. Receiving such a malformed message may indicate an attack attempt. The impact of this flaw depends on how a vulnerable HTTP implementation handles such a malformed message.