Description
Zervit's portable HTTP/web server is vulnerable to remote DoS attacks when a configuration reset request is made. The vulnerability is caused by inadequate validation of user-supplied input. An attacker can exploit this vulnerability by sending malicious requests. If the vulnerability is successfully exploited, the application can be made to stop responding, resulting in a DoS condition. It is possible to manually restart the application.
Problem types
CWE-20 Improper input validation
Product status
Any version
Credits
Rafael Pedrero
References
www.incibe.es/...t-validation-zervit-portable-httpweb-server