Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual page 938

Table of Contents

Advertisement

Network and Security Manager Administration Guide
HTTP:OVERFLOW:AUTH-OVFLW
HTTP:OVERFLOW:CHUNK-LEN-OFLOW
HTTP:OVERFLOW:CHUNK-OVERFLOW
HTTP:OVERFLOW:CONNECTION
HTTP:OVERFLOW:CONTENT-ENCODING
HTTP:OVERFLOW:CONTENT-LANGUAGE
HTTP:OVERFLOW:CONTENT-LENGTH
HTTP:OVERFLOW:CONTENT-LOCATION
HTTP:OVERFLOW:CONTENT-MD5
HTTP:OVERFLOW:CONTENT-OVERFLOW
HTTP:OVERFLOW:CONTENT-TYPE
HTTP:OVERFLOW:COOKIE
HTTP:OVERFLOW:HEADER
HTTP:OVERFLOW:HOST
HTTP:OVERFLOW:HTTPA-OF1
888
This protocol anomaly is an HTTP header with an
authorization line that exceeds the user-defined maximum.
The default authorization line length is 128.
This protocol anomaly is an HTTP message that has a chunk
length in a Transfer-Encoding: chunk request that is greater
than 0x7fffffff. Apache servers 1.3 to 1.3.24 and 2.0 to 2.0.36
are vulnerable. Attackers may cause a denial-of-service
(DoS) or execute arbitrary code on the server.
This protocol anomaly is an invalid data chunk length in an
HTTP request that uses chunked encoding. The chunked
encoding transfer method sends data length requests
followed by data chunks that match the negotiated data
lengths. Attackers may cause a stack overflow and execute
arbitrary code on the server.
DI has detected a suspiciously long Connection header.
DI has detected a suspiciously long Content-Encoding
header.
DI has detected a suspiciously long Content-Language
header.
DI has detected a suspiciously long Content-Length header.
DI has detected a suspiciously long Content-Location header.
DI has detected a suspiciously long Content-MD5 header.
This protocol anomaly is a missing line break after a specified
data length in an HTTP request using content length transfer.
The content length transfer method sends the specified data
length in the BODY of the request followed by a line break.
This protocol anomaly is a Content-Type header length that
exceeds the user-defined maximum. The default length is
64.
This protocol anomaly is an HTTP Cookie header length that
exceeds the user-defined maximum. The default length is
8192.
This protocol anomaly is an HTTP header field that is too
long, and may indicate a buffer overflow attempt.
This protocol anomaly is an HTTP Host header length that
exceeds the user-defined maximum. The default length is
64.
This signature detects buffer overflow attacks against the
HTTPa daemon. Attackers may send a maliciously crafted
HTTP GET request to the host to overflow the buffer.
high
sos5.1.0
critical
sos5.0.0,
sos5.1.0
critical
sos5.1.0
medium
sos5.1.0
medium
sos5.1.0
medium
sos5.1.0
medium
sos5.1.0
medium
sos5.1.0
medium
sos5.1.0
critical
sos5.1.0
medium
sos5.1.0
medium
sos5.1.0
high
sos5.0.0,
sos5.1.0
medium
sos5.1.0
high
sos5.1.0
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents