HTTP: Light HTTPD Get Request Handling Buffer Overflow

This signature detects attempts to exploit a known vulnerability against Light HTTPD for Linux. RedHat Linux versions 7.x are vulnerable. Because Light HTTPD does not properly parse the URL, attackers can send a malicious GET request to execute arbitrary code on the host.

Extended Description

Light httpd is prone to a remotely exploitable buffer overflow condition. This overflow can be triggered by sending the server an excessively long GET request. As Light httpd drops user privileges when running, exploitation of this issue may result in the execution of arbitrary attacker-supplied commands with the privileges of the 'nobody' user.

Affected Products

Light_httpd light_httpd

Short Name
HTTP:LHTTPD:GET-BOF
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Buffer CVE-2002-1549 Get HTTPD Handling Light Overflow Request bid:6162
Release Date
04/22/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Light_httpd

CVSS Score

7.5

Found a potential security threat?