DiGi Web Server allows remote attackers to cause a denial of service (CPU consumption) via an HTTP GET request that contains a large number of / (slash) characters, which consumes resources when DiGi converts the slashes to \ (backslash) characters.
References
Link | Resource |
---|---|
http://www.autistici.org/fdonato/advisory/DiGiWwwServerC1-adv.txt | |
http://sourceforge.net/project/shownotes.php?release_id=234261 | Patch |
http://www.securityfocus.com/bid/10228 | Exploit Patch Vendor Advisory |
http://www.osvdb.org/5702 | Exploit Patch Vendor Advisory |
http://secunia.com/advisories/11490 | Patch Vendor Advisory |
http://securitytracker.com/alerts/2004/Apr/1009957.html | |
http://marc.info/?l=bugtraq&m=108311170018203&w=2 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15987 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2004-04-26 21:00
Updated : 2017-07-10 18:31
NVD link : CVE-2004-1973
Mitre link : CVE-2004-1973
JSON object : View
CWE
Products Affected
digi
- www_server