Short Name |
HTTP:OVERFLOW:HEADER |
---|---|
Severity |
High |
Recommended |
No |
Category |
HTTP |
Release Date |
2003/04/22 |
Update Number |
1213 |
Supported Platforms |
di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This anomaly triggers triggers when it detects a suspiciously long HTTP header field. This can indicate a buffer overflow attempt.
Excessively long HTTP headers could indicate a configuration or implementation error, or it could indicate that an attack against an HTTP server or client is underway.