DiGi Web Server allows remote attackers to cause a denial of service (CPU consumption) via an HTTP GET request that contains a large number of / (slash) characters, which consumes resources when DiGi converts the slashes to \ (backslash) characters.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/10228 | patch vendor advisory vdb entry exploit |
http://secunia.com/advisories/11490 | patch vendor advisory third party advisory |
http://www.osvdb.org/5702 | patch vendor advisory vdb entry exploit |
http://marc.info/?l=bugtraq&m=108311170018203&w=2 | mailing list |
http://sourceforge.net/project/shownotes.php?release_id=234261 | patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15987 | vdb entry |
http://securitytracker.com/alerts/2004/Apr/1009957.html | vdb entry |
http://www.autistici.org/fdonato/advisory/DiGiWwwServerC1-adv.txt |