header-logo
Suggest Exploit
vendor:
Null HTTPd
by:
SecurityFocus
7.5
CVSS
HIGH
Null HTTPd Denial of Service
400
CWE
Product Name: Null HTTPd
Affected Version From: 0.9.0
Affected Version To: 0.9.0
Patch Exists: YES
Related CWE: CVE-2002-1390
CPE: /a:null_httpd:null_httpd:0.9.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2002

Null HTTPd Denial of Service

Null HTTPd is prone to a remotely triggered denial of service vulnerability. The issue has been reported to present itself in the HTTP POST handling routines within the Null HTTPd server. It has been reported that a remote attacker may make a malicious HTTP POST request, specifying a 'Content-Length' value in the HTTP header and then sending data that amounts to 1 byte less that the specified Content-Length. This will reportedly leave each connection on the server in an open state. An attacker can exploit this condition to trigger a denial of service of the affected server.

Mitigation:

Upgrade to the latest version of Null HTTPd.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/8697/info

Null HTTPd has been reported prone to a remotely triggered denial of service vulnerability.

The issue has been reported to present itself in the HTTP POST handling routines within the Null HTTPd server. It has been reported that a remote attacker may make a malicious HTTP POST request, specifying a 'Content-Length' value in the HTTP header and then sending data that amounts to 1 byte less that the specified Content-Length. This will reportedly leave each connection on the server in an open state. An attacker can exploit this condition to trigger a denial of service of the affected server. 

POST / HTTP/1.0
Content-Length: 10

123456789