Plugin ID | 324 |
Plugin name | JanaServer prior 2.4.5 malformed request denial of service |
Plugin filename | JanaServer prior 2.4.5 malformed request denial of service.plugin |
Plugin filesize | 2428 bytes |
Plugin family | HTTP |
Plugin created name | Marc Ruef |
Plugin created email | marc.ruef at computec.ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2005/01/09 |
Plugin version | 1.0 |
Plugin protocol | tcp |
Plugin port | 80 |
Plugin procedure detection | open|send HEAD / HTTP/1.0\n\n|sleep|close|pattern_exists HTTP/#.# ###*Server: Jana-Server/[0-1].* OR HTTP/#.# ###*Server: Jana-Server/2.[0-3].* OR HTTP/#.# ###*Server: Jana-Server/2.4.[0-5]* |
Plugin detection accuracy | 80 |
Plugin comment | The NASL script is Copyright (C) 2004 Tenable Network Security |
Bug vulnerability class | Denial Of Service |
Bug description | The remote host is running a version of the JanaServer which is vulnerable to various denial of service vulnerabilities. An attacker may exploit these vulnerabilities by sending a malformed request to the remote service and cause it to enter an infinite loop, thus refusing connections and using 100% of the CPU of the remote host. |
Bug solution | Upgrade to JanaServer 2.4.5 or newer. |
Bug fixing time | Approx. 30 minutes |
Bug exploit availability | Maybe |
Bug exploit url | http://www.securityfocus.com/bid/11780/exploit/ |
Bug remote | Yes |
Bug local | Yes |
Bug severity | Medium |
Bug popularity | 3 |
Bug simplicity | 4 |
Bug impact | 7 |
Bug risk | 5 |
Bug Nessus risk | Medium |
Bug check tools | Nessus can check this flaw with the plugin 15862 (JanaServer Multiple DoS). |
Source SecurityFocus BID | 11780 |
Source Nessus ID | 15862 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://www.computec.ch |