Short Name |
HTTP:DOS:NOOP-SLED-REQ-MALF |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
No Operation Sled in HTTP Request (Malformed) |
Release Date |
2012/11/14 |
Update Number |
2203 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects a long string of "No Operation" (NOOP) commands sent in an HTTP request that has been malformed. Some vulnerability testing tools incorrectly send a NOOP sled without completing the request. This is generally a benign request that would not exploit the target. Your server is possibly being probed by a test tool.
Buffer overflow in iMonitor 2.4 in Novell eDirectory 8.8 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via unknown attack vectors.