header-logo
Suggest Exploit
vendor:
RobinHood Web Server
by:
SecurityFocus
7.5
CVSS
HIGH
Improper Bounds Checking
120
CWE
Product Name: RobinHood Web Server
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: BeOS
2002

Improper Bounds Checking in RobinHood Web Server

Improper bounds checking exists in code that handles requests (RHCWindow.cpp and RHLogger.cpp). The components RHConsole and RHDaemon will cease operations upon receiving a request consisting of over 4078 bytes. If RobinHood were to encounter such requests repeatedly, a prolonged denial of service attack may result. Restarting the application is required in order to regain normal functionality.

Mitigation:

Restarting the application is required in order to regain normal functionality.
Source

Exploit-DB raw data:

source : https://www.securityfocus.com/bid/1944/info


RobinHood is a HTTP/1.1 web server based upon libHTTP and is designed for the BeOS platform.

Improper bounds checking exists in code that handles requests (RHCWindow.cpp and RHLogger.cpp). The components RHConsole and RHDaemon will cease operations upon receiving a request consisting of over 4078 bytes. If RobinHood were to encounter such requests repeatedly, a prolonged denial of service attack may result. Restarting the application is required in order to regain normal functionality.


$ telnet target 80
Trying target...
Connected to target.
Escape character is '^]'.
<character string consisting of over 4078 bytes>