The Debut embedded http server contains a remotely exploitable denial of service where a single malformed HTTP POST request can cause the server to hang until eventually replying (~300 seconds) with an HTTP 500 error. While the server is hung, print jobs over the network are blocked and the web interface is inaccessible. An attacker can continuously send this malformed request to keep the device inaccessible to legitimate traffic.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/144908/Debut-Embedded-httpd-1.20-Denial-Of-Service.html | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/43119/ | Exploit Third Party Advisory VDB Entry |
https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2017-017/?fid=10211 | Exploit Third Party Advisory |
https://www.trustwave.com/Resources/SpiderLabs-Blog/Denial-of-Service-Vulnerability-in-Brother-Printers/?page=1&year=0&month=0&LangType=1033 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-11-09T19:00:00
Updated: 2017-11-20T20:57:01
Reserved: 2017-10-31T00:00:00
Link: CVE-2017-16249
JSON object: View
NVD Information
Status : Analyzed
Published: 2017-11-10T02:29:18.607
Modified: 2019-10-03T00:03:26.223
Link: CVE-2017-16249
JSON object: View
Redhat Information
No data.
CWE