Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

HTTP:TOO-MANY-PARAMETERS

Severity

Major

Recommended

Yes

Recommended Action

Drop

Category

HTTP

Keywords

Hash Collsion

Release Date

2011/03/01

Update Number

1874

Supported Platforms

idp-4.1.110110609+, isg-3.4.139899+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: Too many parameters


This protocol anomaly is triggered when it detects an HTTP request with the number of parameters above the pre-set threshold. This threshold can be adjusted in via NSM.

Extended Description

Microsoft ASP.NET is prone to a denial-of-service vulnerability. An attacker can exploit this issue by sending a small number of specially crafted ASP.NET form posts to an affected ASP.NET site. Successful exploits will attackers to disrupt the availability of sites that use ASP.NET

Affected Products

  • Avaya aura_conferencing 6.0 Standard
  • Avaya callpilot 4.0
  • Avaya callpilot 5.0
  • Avaya communication_server_1000_telephony_manager 3.0
  • Avaya communication_server_1000_telephony_manager 4.0
  • Avaya meeting_exchange 5.0
  • Avaya meeting_exchange 5.0.0.0.52
  • Avaya meeting_exchange 5.0 SP1
  • Avaya meeting_exchange 5.0 SP2
  • Avaya meeting_exchange 5.1
  • Avaya meeting_exchange 5.1 SP1
  • Avaya meeting_exchange 5.2
  • Avaya meeting_exchange 5.2 SP1
  • Avaya meeting_exchange 5.2 SP2
  • Avaya meeting_exchange-client_registration_server
  • Avaya meeting_exchange-recording_server
  • Avaya meeting_exchange-streaming_server
  • Avaya meeting_exchange-web_conferencing_server
  • Avaya meeting_exchange-webportal
  • Avaya messaging_application_server 4
  • Avaya messaging_application_server 5
  • Avaya messaging_application_server 5.2
  • Microsoft .net_framework 1.0
  • Microsoft .net_framework 1.0 Beta2
  • Microsoft .net_framework 1.0 Gold
  • Microsoft .net_framework 1.0 SP1
  • Microsoft .net_framework 1.0 SP2
  • Microsoft .net_framework 1.0 SP3
  • Microsoft .net_framework 1.1
  • Microsoft .net_framework 1.1 SP1
  • Microsoft .net_framework 2.0
  • Microsoft .net_framework 2.0 SP2
  • Microsoft .net_framework 3.5
  • Microsoft .net_framework 3.5.1
  • Microsoft .net_framework 3.5 SP1
  • Microsoft .net_framework 4.0

References

  • BugTraq: 51200
  • BugTraq: 51186
  • BugTraq: 51194
  • CVE: CVE-2011-5036
  • CVE: CVE-2011-4838
  • CVE: CVE-2011-5034
  • CVE: CVE-2011-3414
  • CVE: CVE-2011-4858
  • CVE: CVE-2011-4885
  • CVE: CVE-2011-5035
  • CVE: CVE-2010-1899
  • CVE: CVE-2011-4461
  • CVE: CVE-2011-4462
  • CVE: CVE-2011-4815
  • URL: http://technet.microsoft.com/en-us/security/advisory/2659883
  • URL: http://www.kb.cert.org/vuls/id/903934

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out