ID

VAR-201006-0457


CVE

CVE-2010-2435


TITLE

Weborf HTTP Server Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2010-005560

DESCRIPTION

Weborf HTTP Server 0.12.1 and earlier allows remote attackers to cause a denial of service (crash) via Unicode characters in a Connection HTTP header, and possibly other headers. Weborf is a lightweight web server developed in C. Weborf has an error in processing part of the HTTP header field data. The attacker submits an HTTP header request containing a wide character to stop the service program from responding. Weborf is prone to a denial-of-service vulnerability. Remote attackers can exploit this issue to cause the application to crash, denying service to legitimate users. Weborf 0.12.1 is vulnerable; prior versions may also be affected. ---------------------------------------------------------------------- Secunia CSI integrated with Microsoft WSUS and Microsoft SCCM for 3rd party Patch Management Free webinars http://secunia.com/vulnerability_scanning/corporate/webinars/ ---------------------------------------------------------------------- TITLE: Weborf Header Processing Denial of Service Vulnerability SECUNIA ADVISORY ID: SA40322 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/40322/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=40322 RELEASE DATE: 2010-06-29 DISCUSS ADVISORY: http://secunia.com/advisories/40322/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/40322/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=40322 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in Weborf, which can be exploited by malicious people to cause a DoS (Denial of Service). This can be exploited to terminate an affected server via e.g. specially crafted HTTP headers containing wide characters. The vulnerability is reported in version 0.12.1. SOLUTION: Update to version 0.12.2. PROVIDED AND/OR DISCOVERED BY: Crash, DcLabs Security Group ORIGINAL ADVISORY: http://freshmeat.net/projects/weborf/releases/318531 http://code.google.com/p/weborf/source/browse/branches/0.12.2/CHANGELOG?spec=svn437&r=437 DcLabs Security Group: http://archives.neohapsis.com/archives/bugtraq/2010-06/0215.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.52

sources: NVD: CVE-2010-2435 // JVNDB: JVNDB-2010-005560 // CNVD: CNVD-2010-1175 // BID: 41064 // PACKETSTORM: 91193

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2010-1175

AFFECTED PRODUCTS

vendor:salvo tomasellimodel:weborf http serverscope:lteversion:0.12.1

Trust: 1.8

vendor:salvo tomasellimodel:weborf http serverscope:eqversion:0.10

Trust: 1.6

vendor:salvo tomasellimodel:weborf http serverscope:eqversion:0.12

Trust: 1.6

vendor:salvo tomasellimodel:weborf http serverscope:eqversion:0.11

Trust: 1.6

vendor:nomodel: - scope: - version: -

Trust: 0.6

vendor:salvo tomasellimodel:weborf http serverscope:eqversion:0.12.1

Trust: 0.6

vendor:galileomodel:students team weborfscope:eqversion:0.12.1

Trust: 0.3

vendor:galileomodel:students team weborfscope:neversion:0.12.3

Trust: 0.3

sources: CNVD: CNVD-2010-1175 // BID: 41064 // JVNDB: JVNDB-2010-005560 // CNNVD: CNNVD-201006-397 // NVD: CVE-2010-2435

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-2435
value: MEDIUM

Trust: 1.0

NVD: CVE-2010-2435
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201006-397
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2010-2435
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2010-005560 // CNNVD: CNNVD-201006-397 // NVD: CVE-2010-2435

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.8

sources: JVNDB: JVNDB-2010-005560 // NVD: CVE-2010-2435

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201006-397

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201006-397

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-005560

PATCH

title:CHANGELOGurl:http://code.google.com/p/weborf/source/browse/branches/0.12.2/CHANGELOG?spec=svn437&r=437

Trust: 0.8

title:Weborf HTTP header handles denial of service patchesurl:https://www.cnvd.org.cn/patchInfo/show/516

Trust: 0.6

sources: CNVD: CNVD-2010-1175 // JVNDB: JVNDB-2010-005560

EXTERNAL IDS

db:NVDid:CVE-2010-2435

Trust: 2.7

db:BIDid:41064

Trust: 2.5

db:SECUNIAid:40322

Trust: 1.7

db:JVNDBid:JVNDB-2010-005560

Trust: 0.8

db:CNVDid:CNVD-2010-1175

Trust: 0.6

db:NSFOCUSid:15299

Trust: 0.6

db:BUGTRAQid:20100623 WEBORF DCA-00012 VULNERABILITY REPORT

Trust: 0.6

db:CNNVDid:CNNVD-201006-397

Trust: 0.6

db:PACKETSTORMid:91193

Trust: 0.1

sources: CNVD: CNVD-2010-1175 // BID: 41064 // JVNDB: JVNDB-2010-005560 // PACKETSTORM: 91193 // CNNVD: CNNVD-201006-397 // NVD: CVE-2010-2435

REFERENCES

url:http://freshmeat.net/projects/weborf/releases/318531

Trust: 2.0

url:http://www.securityfocus.com/bid/41064

Trust: 1.6

url:http://secunia.com/advisories/40322

Trust: 1.6

url:http://www.securityfocus.com/archive/1/511953/100/0/threaded

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2435

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-2435

Trust: 0.8

url:http://freshmeat.net/projects/weborf/releases/318531http

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/511953/100/0/threaded

Trust: 0.6

url:http://www.nsfocus.net/vulndb/15299

Trust: 0.6

url:http://code.google.com/p/weborf/source/browse/branches/0.12.2/changelog?spec=svn437&r=437

Trust: 0.4

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=40322

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/webinars/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/advisories/40322/#comments

Trust: 0.1

url:http://archives.neohapsis.com/archives/bugtraq/2010-06/0215.html

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/40322/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2010-1175 // BID: 41064 // JVNDB: JVNDB-2010-005560 // PACKETSTORM: 91193 // CNNVD: CNNVD-201006-397 // NVD: CVE-2010-2435

CREDITS

Ewerson_Guimarães crash@dclabs.com.br

Trust: 0.6

sources: CNNVD: CNNVD-201006-397

SOURCES

db:CNVDid:CNVD-2010-1175
db:BIDid:41064
db:JVNDBid:JVNDB-2010-005560
db:PACKETSTORMid:91193
db:CNNVDid:CNNVD-201006-397
db:NVDid:CVE-2010-2435

LAST UPDATE DATE

2025-04-11T23:19:05.964000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2010-1175date:2010-06-24T00:00:00
db:BIDid:41064date:2015-04-13T21:02:00
db:JVNDBid:JVNDB-2010-005560date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-201006-397date:2010-06-28T00:00:00
db:NVDid:CVE-2010-2435date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CNVDid:CNVD-2010-1175date:2010-06-24T00:00:00
db:BIDid:41064date:2010-06-23T00:00:00
db:JVNDBid:JVNDB-2010-005560date:2012-12-20T00:00:00
db:PACKETSTORMid:91193date:2010-06-28T06:56:32
db:CNNVDid:CNNVD-201006-397date:2010-06-28T00:00:00
db:NVDid:CVE-2010-2435date:2010-06-24T17:30:01