Loading HuntDB...

solving TOR vulnerability, in other to make bruteforce difficult

Low
T
Tor
Submitted None
Reported by joelisto

Vulnerability Details

Technical details and impact analysis

Array Index Underflow
actually this is result on my recent vulnerability scan on the TOR website below: 135/tcp filtered msrpc no-response 139/tcp filtered netbios-ssn no-response 443/tcp open https syn-ack ttl 51 |_http-csrf: Couldn't find any CSRF vulnerabilities. |_http-dombased-xss: Couldn't find any DOM based XSS. | http-iis-webdav-vuln: |_ ERROR: This web server is not supported. | http-slowloris-check: | VULNERABLE: | Slowloris DOS attack | State: LIKELY VULNERABLE | IDs: CVE:CVE-2007-6750 | Slowloris tries to keep many connections to the target web server open and hold | them open as long as possible. It accomplishes this by opening connections to | the target web server and sending a partial request. By doing so, it starves | the http server's resources causing Denial Of Service.

Related CVEs

Associated Common Vulnerabilities and Exposures

The Apache HTTP Server 1.x and 2.x allows remote attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris, related to the lack of the mod_reqtimeout module in versions before 2.2.15.

Report Details

Additional information and metadata

State

Closed

Substate

Informative

Submitted

Weakness

Array Index Underflow