Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

HTTP:DOS:URI-PARAM-RANDOM

Severity

Major

Recommended

No

Category

HTTP

Keywords

Suspicious Random URI And GET Parameter

Release Date

2017/03/21

Update Number

2839

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: Suspicious Random URI And GET Parameter


This signature detects a suspicious HTTP URL. This kind of behavior is mostly observed when someone is trying to scan and send malicious traffic against a network security device using various traffic generation tools. This signature may trigger false-positives inside the Intranet traffic, so it is suggested to avoid using it for inspecting such traffic. This signature is highly recommended to protect web servers and devices deployed at a data centre.

Extended Description

HAproxy 1.6.x before 1.6.6, when a deny comes from a reqdeny rule, allows remote attackers to cause a denial of service (uninitialized memory access and crash) or possibly have unspecified other impact via unknown vectors.

Affected Products

  • Canonical ubuntu_linux 16.04
  • Haproxy haproxy 1.6.0
  • Haproxy haproxy 1.6.1
  • Haproxy haproxy 1.6.2
  • Haproxy haproxy 1.6.3
  • Haproxy haproxy 1.6.4
  • Haproxy haproxy 1.6.5

References

  • CVE: CVE-2016-5360
  • URL: http://www.openwall.com/lists/oss-security/2016/06/09/5

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out