Short Name |
HTTP:OVERFLOW:CONTENT-OVERFLOW |
---|---|
Severity |
Major |
Recommended |
Yes |
Category |
HTTP |
Keywords |
http |
Release Date |
2003/08/27 |
Update Number |
1213 |
Supported Platforms |
di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This protocol anomaly triggers when the indicated length in the HTTP header Content-Length is exceeded by the length of the actual content data.
This signature detects a malformed HTTP message with an entity body having a length larger than what is specified in the Content-Length header. Receiving such a malformed message may indicate an attack attempt. The impact of this flaw depends on how a vulnerable HTTP implementation handles such a malformed message.