HTTP: ATPhttpd Buffer Overflow

This signature detects attempts to exploit a known vulnerability against ATPhttp versions 0.4b and earlier. Attackers can send an overly long GET request to the Web server daemon to overflow the buffer and create a denial of service condition.

Extended Description

Athttpd is said to be prone to a remote buffer overrun that could allow an attacker to execute arbitrary code. The problem occurs due to insufficient bounds checking when handling GET requests. As a result, an attacker may be capable of overrunning the bounds of an internal memory buffer and effectively control the flow of execution.

Affected Products

Athttpd athttpd

Short Name
HTTP:OVERFLOW:ATP-HTTPD-OF
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
ATPhttpd Buffer Overflow bid:8709
Release Date
10/01/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Athttpd

Found a potential security threat?