HTTP: Light HTTPD Get Request Handling Buffer Overflow
This signature detects attempts to exploit a known vulnerability against Light HTTPD for Linux. RedHat Linux versions 7.x are vulnerable. Because Light HTTPD does not properly parse the URL, attackers can send a malicious GET request to execute arbitrary code on the host.
Extended Description
Light httpd is prone to a remotely exploitable buffer overflow condition. This overflow can be triggered by sending the server an excessively long GET request. As Light httpd drops user privileges when running, exploitation of this issue may result in the execution of arbitrary attacker-supplied commands with the privileges of the 'nobody' user.
Affected Products
Light_httpd light_httpd
References
BugTraq: 6162
CVE: CVE-2002-1549
URL: http://www.security.nnov.ru/search/document.asp?docid=3745
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Light_httpd
7.5