Vulnerabilities > CVE-2004-1727 - Denial Of Service vulnerability in Working Resources Inc. Badblue 2.50

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
working-resources-inc
nessus
exploit available

Summary

BadBlue 2.5 allows remote attackers to cause a denial of service (refuse HTTP connections) via a large number of connections from the same IP address.

Vulnerable Configurations

Part Description Count
Application
Working_Resources_Inc.
1

Exploit-Db

descriptionBadBlue 2.52 Web Server Multiple Connections Denial of Service Exploit. CVE-2004-1727. Dos exploit for windows platform
idEDB-ID:419
last seen2016-01-31
modified2004-08-26
published2004-08-26
reporterGulfTech Security
sourcehttps://www.exploit-db.com/download/419/
titleBadBlue 2.52 Web Server Multiple Connections Denial of Service Exploit

Nessus

NASL familyWeb Servers
NASL idBADBLUE_MAX_CONNECTIONS_DOS.NASL
descriptionAccording to its banner, the remote BadBlue web server has a bug which may allow attackers to prevent it from serving pages properly. It is possible to disable the remote BadBlue server by issuing approximately 24 concurrent connections to the remote host. An attacker may exploit this flaw by issuing over 24 connections to the remote server and waiting indefinitely, thus preventing legitimate users from being able to connect to this service at all.
last seen2020-06-01
modified2020-06-02
plugin id14350
published2004-08-23
reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/14350
titleBadBlue Connection Saturation Remote DoS
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if(description)
{
 script_id(14350);
 script_version ("1.14");
 script_cve_id("CVE-2004-1727");
 script_bugtraq_id(10983);

 script_name(english:"BadBlue Connection Saturation Remote DoS"); 
 
 script_set_attribute(attribute:"synopsis", value:
"The remote web server is affected by a denial of service vulnerability." );
 script_set_attribute(attribute:"description", value:
"According to its banner, the remote BadBlue web server has a bug which 
may allow attackers to prevent it from serving pages properly. It is 
possible to disable the remote BadBlue server by issuing approximately
24 concurrent connections to the remote host. An attacker may exploit 
this flaw by issuing over 24 connections to the remote server and 
waiting indefinitely, thus preventing legitimate users from being able 
to connect to this service at all." );
 script_set_attribute(attribute:"solution", value:
"There is no known solution at this time." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:U/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"plugin_publication_date", value: "2004/08/23");
 script_set_attribute(attribute:"vuln_publication_date", value: "2004/08/20");
 script_cvs_date("Date: 2018/06/27 18:42:26");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();
 
 script_summary(english:"Get the version of the remote badblue server");
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.");
 script_family(english:"Web Servers");
 script_require_ports("Services/www", 80);
 script_dependencies("find_service1.nasl", "http_version.nasl");
 exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);

banner = get_http_banner(port:port);
if(!banner)exit(0);

vulnerable = egrep(pattern:"^Server: BadBlue/(1\.|2\.[0-5])", string:banner);
if(vulnerable)security_warning(port);