header-logo
Suggest Exploit
vendor:
GoAhead Web Server
by:
SecurityFocus
2.6
CVSS
LOW
Denial of Service
N/A
CWE
Product Name: GoAhead Web Server
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2001

Denial of Service in GoAhead Web Server

A problem with the GoAhead Web Server makes it possible to deny service to legitimate users of the software package. By accessing the web server, and issuing a request for the /aux directory, the web server ceases functioning. The process has to be manually restarted to resume normal operation.

Mitigation:

Restart the web server manually to resume normal operation.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/2607/info

The GoAhead Web Server is a freely available, open source software package developed by GoAhead. The GoAhead Web Server offers a multi-platform web server and source code to the community.

A problem with the web server makes it possible to deny service to legitmate users of the software package. By accessing the web server, and issuing a request for the /aux directory, the web server ceases functioning. The process has to be manually restarted to resume normal operation.

Therefore, it is possible for a remote user to deny service to legitimate users of the web server. 

telnet web.server 80
GET /aux
then hit return twice