First published: Tue Apr 27 2004(Updated: )
DiGi Web Server allows remote attackers to cause a denial of service (CPU consumption) via an HTTP GET request that contains a large number of / (slash) characters, which consumes resources when DiGi converts the slashes to \ (backslash) characters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Digi Www Server | =compieuw-beta2 | |
Digi Www Server | =compieuw | |
Digi Www Server | =compieuw-beta1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1973 has a severity rating that indicates it can result in a denial of service through excessive CPU consumption.
To fix CVE-2004-1973, it is recommended to update the DiGi Web Server to a patched version that mitigates this vulnerability.
Users of DiGi Web Server versions compieuw, compieuw-beta1, and compieuw-beta2 are affected by CVE-2004-1973.
CVE-2004-1973 involves a denial of service attack initiated by sending HTTP GET requests with numerous slash characters.
CVE-2004-1973 was published in 2004 as part of an ongoing effort to document vulnerabilities in software.