Troubleshooting
Problem
According to the scan report by Nesuss tool, the below test case will be highlighted as false alert which is not a vulnerability in the remote system: Reported By Nessus 17231 - CERN httpd CGI Name Handling Remote Overflow More description from the report: The remote web server stopped responding after sending it a GET request for a CGI script with a arbitrary long file name. This is known to trigger a heap overflow in some servers like CERN HTTPD. An attacker may use this flaw to disrupt the remoteservice and possibly even run malicious code on the affected host subject to the privileges under which the service operates.
Resolving The Problem
Source
RETAIN tip: H212009
Symptom
According to the scan report by Nesuss tool, the below test case will be highlighted as false alert which is not a vulnerability in the remote system:
Reported By Nessus| 17231 - CERN httpd CGI Name Handling Remote Overflow |
More description from the report:
The remote web server stopped responding after sending it a GET request for a CGI script with a arbitrary long file name. This is known to trigger a heap overflow in some servers like CERN HTTPD. An attacker may use this flaw to disrupt the remote service and possibly even run malicious code on the affected host subject to the privileges under which the service operates.
Affected configurations
The system may be any of the following IBM servers:
- System x3530 M4, type 7160, any model
- System x3530 M4, type 7160 E5-xxxxV2, any model
- System x3630 M4, type 7158, any modelÂ
- System x3630 M4, type 7158 E5-xxxxV2, any model
This tip is not software specific.
This tip is not option specific.
The Nessus utility is affected.
The following system firmware level(s) are affected:
- IMM Build ID:
- 1AOO50I Revision 3.68
Additional information
The symptom is reported when users run the Nessus tool, which is used to identify network vulnerabilities on remote systems.
Investigation shows that there is a firewall on rate limiter feature to be activated once threshold is reached. Disabling rate limiter temporarily will prevent this issue from happening.
If rate limiter identifies the condition, it will trigger Nessus to report this false alert above which is not a true vulnerability. The rate limiter feature is a solution to limit the flood of traffic from ruining the private/public network.
No workaround or fix is needed for this false alert.
Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
30 January 2019
UID
ibm1MIGR-5094652