Synopsis
The remote web server is prone to a remote format string attack.
Description
The remote web server seems to be vulnerable to a remote format string attack based on the way it responds to a request containing a header whose name includes a format string. An anonymous attacker may be able to leverage this flaw to make the affected service crash or to execute arbitrary code on this host.
Solution
Upgrade the software or contact the vendor and inform them of this vulnerability.
Plugin Details
File Name: http_header_name_format_string.nasl
Configuration: Enable paranoid mode
Supported Sensors: Nessus
Vulnerability Information
Required KB Items: Settings/ParanoidReport