Vulnerabilities > CVE-2004-2381 - Denial Of Service vulnerability in Jetty

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
jetty
nessus

Summary

HttpRequest.java in Jetty HTTP Server before 4.2.19 allows remote attackers to cause denial of service (memory usage and application crash) via HTTP requests with a large Content-Length.

Vulnerable Configurations

Part Description Count
Application
Jetty
67

Nessus

NASL familyWeb Servers
NASL idJETTY_4_1_9_DOS.NASL
descriptionAccording to its banner, the remote host is running a version of Jetty that is older than 4.2.19. The version is vulnerable to a unspecified denial of service.
last seen2020-06-01
modified2020-06-02
plugin id17348
published2005-03-17
reporterThis script is Copyright (C) 2005-2018 Westpoint Limited
sourcehttps://www.tenable.com/plugins/nessus/17348
titleJetty < 4.2.19 HTTP Server HttpRequest.java Content-Length Handling Remote Overflow DoS
code
#
# Sarju Bhagat <[email protected]>
#
# GPLv2
#

# Changes by Tenable:
# - added CVE xrefs.
# - revised plugin title, changed family (6/17/09)

include("compat.inc");

if (description)
{
 script_id(17348);
 script_version("1.19");
 script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/12");

 script_cve_id("CVE-2004-2381");
 script_bugtraq_id(9917);

 script_name(english:"Jetty < 4.2.19 HTTP Server HttpRequest.java Content-Length Handling Remote Overflow DoS");
 script_summary(english:"Checks for the version of Jetty");

 script_set_attribute(attribute:"synopsis", value:
"The remote web server is prone to a denial of service attack.");
 script_set_attribute(attribute:"description", value:
"According to its banner, the remote host is running a version of Jetty
that is older than 4.2.19.  The version is vulnerable to a unspecified
denial of service.");
 script_set_attribute(attribute:"see_also", value:"http://sourceforge.net/project/shownotes.php?release_id=224743");
 script_set_attribute(attribute:"solution", value:"Upgrade to version 4.2.19 or later.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"plugin_publication_date", value:"2005/03/17");
 script_set_attribute(attribute:"vuln_publication_date", value:"2004/03/19");

 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:mortbay:jetty");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2005-2020 Westpoint Limited");
 script_family(english:"Web Servers");

 script_dependencie("http_version.nasl");
 script_require_ports("Services/www", 80);
 exit(0);
}

#
# The script code starts here
#

include("http_func.inc");

port = get_http_port(default:80, embedded:TRUE);

if(get_port_state(port))
{
 banner = get_http_banner(port:port);
 if(!banner || "Jetty/" >!< banner )exit(0);

 serv = strstr(banner, "Server");
 if(ereg(pattern:"Jetty/4\.([01]\.|2\.([0-9][^0-9]|1[0-8]))", string:serv))
 {
   security_warning(port);
   exit(0);
 }
}