CCE-28106-3Platform: apache-httpd2.0 | Date: (C)2013-02-19 (M)2022-10-10 |
The Apache "LimitRequestline" directive should be configured appropriatley.
Parameter:
(1) Number value (in bytes)
Technical Mechanism:
(1) Apache configuration file: LimitRequestLine directive
CCSS Severity: | CCSS Metrics: |
CCSS Score : | Attack Vector: |
Exploit Score: | Attack Complexity: |
Impact Score: | Privileges Required: |
Severity: | User Interaction: |
Vector: | Scope: |
| Confidentiality: |
| Integrity: |
| Availability: |
| |
References: Resource Id | Reference |
---|
CIS Apache Benchmark for Unix For Apache Versions 1.3 and 2.0 Levels I and II | L2 7. Buffer Overflow Protections p42 |
DISA STIG Apache SERVER 2.0 for Unix Release: 1 Benchmark Date: 23 Nov 2011 | Rule Title: The HTTP request line must be limited.
STIG ID: WA000-WWA066 A22 Rule ID: SV-32768r1_rule Vuln ID: V-13739
Severity: CAT II Class: Unclass |
DISA STIG Apache SERVER 2.0 for Windows Release: 1 Benchmark Date: 23 Nov 2011 | Rule Title: The HTTP request line must be limited.
STIG ID: WA000-WWA066 W22 Rule ID: SV-33011r1_rule Vuln ID: V-13739
Severity: CAT II Class: Unclass |