[] NeoSense

NullLogic Null HTTPd 0.5 - Remote Denial of Service

Author: Luigi Auriemma
type: dos
platform: multiple
port: 
date_added: 2003-09-24 
date_updated: 2012-12-06 
verified: 1 
codes: OSVDB-3571 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/8697/info

Null HTTPd has been reported prone to a remotely triggered denial of service vulnerability.

The issue has been reported to present itself in the HTTP POST handling routines within the Null HTTPd server. It has been reported that a remote attacker may make a malicious HTTP POST request, specifying a 'Content-Length' value in the HTTP header and then sending data that amounts to 1 byte less that the specified Content-Length. This will reportedly leave each connection on the server in an open state. An attacker can exploit this condition to trigger a denial of service of the affected server.

POST / HTTP/1.0
Content-Length: 10

123456789