CCE-27426-6Platform: apache-httpd2.2 | Date: (C)2013-02-19 (M)2022-10-10 |
The Apache "LimitRequestline" directive should be configured appropriatley.
Parameter:
(1) Number value (in bytes)
Technical Mechanism:
(1) Apache configuration file: LimitRequestLine directive
CCSS Severity: | CCSS Metrics: |
CCSS Score : | Attack Vector: |
Exploit Score: | Attack Complexity: |
Impact Score: | Privileges Required: |
Severity: | User Interaction: |
Vector: | Scope: |
| Confidentiality: |
| Integrity: |
| Availability: |
| |
References: Resource Id | Reference |
---|
CIS Security Configuration Benchmark For Apache Web Server 2.2 Version 3.1.0 June 11th, 2012 | 1.9.2 Buffer Overflow Mitigation (Level 2, Scorable)
Add or modify the LimitRequestline directive in the Apache configuration to have a value of 512 or shorter. LimitRequestline 512 page 72 |
CIS Security Configuration Benchmark For Apache Web Server 2.2.0 Version 2.2.0 November 2008 | 1.14 Buffer Overflow Protection Tuning p24 |
DISA STIG Apache SERVER 2.2 for Windows Release: 1 Benchmark Date: 23 Nov 2011 | Rule Title: The HTTP request line must be limited.
STIG ID: WA000-WWA066 W22 Rule ID: SV-33011r1_rule Vuln ID: V-13739
Severity: CAT II Class: Unclass |
DISA STIG Apache SERVER 2.2 for Unix Release: 1 Benchmark Date: 23 Nov 2011 | Rule Title: The HTTP request line must be limited.
STIG ID: WA000-WWA066 A22 Rule ID: SV-32768r1_rule Vuln ID: V-13739
Severity: CAT II Class: Unclass |