Buffer overflow protection should be configured 'LimitRequestBody'

Information

Buffer overflow vulnerabilities stem from problems in string handling. Whenever a computer program tries copying a string or buffer into a buffer that is smaller than the string, an overflow is caused. If the destination buffer is overflowed sufficiently it will overwrite various crucial system data. In most situations an attacker can leverage this to takeover a specific program's process, thereby acquiring the privileges of process or program

Solution

Edit the httpd.conf file and add the following
LimitRequestBody 10240
LimitRequestFields 40
LimitRequestFieldsize 100
LimitRequestline 500

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-5

Plugin: Windows

Control ID: 3529ee5428d3431e12064c884e2a8c54a7cb9fbcef3314166e3a14d41a6e7295