Secunia Security Advisory - Ziv Kamir has reported a vulnerability in NetworkActiv Web Server, which can be exploited by malicious people to cause a DoS (Denial of Service).
d36690b3577e5e18c69d15c07cd18e66cd533008c7ff086d7012dfb1566a7f63
TITLE:
NetworkActiv Web Server Denial of Service Vulnerability
SECUNIA ADVISORY ID:
SA12719
VERIFY ADVISORY:
http://secunia.com/advisories/12719/
CRITICAL:
Less critical
IMPACT:
DoS
WHERE:
>From remote
SOFTWARE:
NetworkActiv Web Server 1.x
http://secunia.com/product/4007/
DESCRIPTION:
Ziv Kamir has reported a vulnerability in NetworkActiv Web Server,
which can be exploited by malicious people to cause a DoS (Denial of
Service).
The vulnerability is caused due to an input validation error when
handling HTTP requests. This can be exploited to cause a vulnerable
server to consume a large amount of CPU resources by sending an HTTP
GET request containing the URL encoded representation of the "%"
character (%25).
Example:
http://[victim]/%25
The vulnerability has been reported in version 1.0. Other versions
may also be affected.
SOLUTION:
Update to version 1.0 dated 2004-09-28 or later:
http://www.networkactiv.com/NetworkActivWebServerV1.0.exe
PROVIDED AND/OR DISCOVERED BY:
Ziv Kamir
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------