How can get the reproduce/test procedure for the vulnerabilities reported by NESSUS?












0















My NESSUS scanning gives report that there are vulnerabilities in my host, such as:



>     Vulnerabilities by PluginExpand All | Collapse All
> **11801 (1) - HTTP Method Remote Format String-**
> **Synopsis**
> It is possible to execute code on the remote host through the web server.
> DescriptionThe remote web server seems to be vulnerable to a format string attack on the method name. An attacker might use this
> flaw to make it crash or even execute arbitrary code on this host.
> **Solution**
> Upgrade your software or contact your vendor and inform him of this vulnerability.


I expect that the tool should give the detailed http request used that can crash my http server, but it is not included in the report.
So I am in difficulty to investigate/remedy this vulnerability.



Please help to suggest how I can figure out the http request used which can crash my server? Can the NESSUS tool have this information provided?










share|improve this question



























    0















    My NESSUS scanning gives report that there are vulnerabilities in my host, such as:



    >     Vulnerabilities by PluginExpand All | Collapse All
    > **11801 (1) - HTTP Method Remote Format String-**
    > **Synopsis**
    > It is possible to execute code on the remote host through the web server.
    > DescriptionThe remote web server seems to be vulnerable to a format string attack on the method name. An attacker might use this
    > flaw to make it crash or even execute arbitrary code on this host.
    > **Solution**
    > Upgrade your software or contact your vendor and inform him of this vulnerability.


    I expect that the tool should give the detailed http request used that can crash my http server, but it is not included in the report.
    So I am in difficulty to investigate/remedy this vulnerability.



    Please help to suggest how I can figure out the http request used which can crash my server? Can the NESSUS tool have this information provided?










    share|improve this question

























      0












      0








      0








      My NESSUS scanning gives report that there are vulnerabilities in my host, such as:



      >     Vulnerabilities by PluginExpand All | Collapse All
      > **11801 (1) - HTTP Method Remote Format String-**
      > **Synopsis**
      > It is possible to execute code on the remote host through the web server.
      > DescriptionThe remote web server seems to be vulnerable to a format string attack on the method name. An attacker might use this
      > flaw to make it crash or even execute arbitrary code on this host.
      > **Solution**
      > Upgrade your software or contact your vendor and inform him of this vulnerability.


      I expect that the tool should give the detailed http request used that can crash my http server, but it is not included in the report.
      So I am in difficulty to investigate/remedy this vulnerability.



      Please help to suggest how I can figure out the http request used which can crash my server? Can the NESSUS tool have this information provided?










      share|improve this question














      My NESSUS scanning gives report that there are vulnerabilities in my host, such as:



      >     Vulnerabilities by PluginExpand All | Collapse All
      > **11801 (1) - HTTP Method Remote Format String-**
      > **Synopsis**
      > It is possible to execute code on the remote host through the web server.
      > DescriptionThe remote web server seems to be vulnerable to a format string attack on the method name. An attacker might use this
      > flaw to make it crash or even execute arbitrary code on this host.
      > **Solution**
      > Upgrade your software or contact your vendor and inform him of this vulnerability.


      I expect that the tool should give the detailed http request used that can crash my http server, but it is not included in the report.
      So I am in difficulty to investigate/remedy this vulnerability.



      Please help to suggest how I can figure out the http request used which can crash my server? Can the NESSUS tool have this information provided?







      security nessus






      share|improve this question













      share|improve this question











      share|improve this question




      share|improve this question










      asked Nov 26 '18 at 3:16









      Michael.SunMichael.Sun

      549




      549
























          1 Answer
          1






          active

          oldest

          votes


















          0














          Have you checked the code in the related NASL (http_method_format_string.nasl) as well as the include files?
          Check this page to locate the Plugin Directory






          share|improve this answer

























            Your Answer






            StackExchange.ifUsing("editor", function () {
            StackExchange.using("externalEditor", function () {
            StackExchange.using("snippets", function () {
            StackExchange.snippets.init();
            });
            });
            }, "code-snippets");

            StackExchange.ready(function() {
            var channelOptions = {
            tags: "".split(" "),
            id: "1"
            };
            initTagRenderer("".split(" "), "".split(" "), channelOptions);

            StackExchange.using("externalEditor", function() {
            // Have to fire editor after snippets, if snippets enabled
            if (StackExchange.settings.snippets.snippetsEnabled) {
            StackExchange.using("snippets", function() {
            createEditor();
            });
            }
            else {
            createEditor();
            }
            });

            function createEditor() {
            StackExchange.prepareEditor({
            heartbeatType: 'answer',
            autoActivateHeartbeat: false,
            convertImagesToLinks: true,
            noModals: true,
            showLowRepImageUploadWarning: true,
            reputationToPostImages: 10,
            bindNavPrevention: true,
            postfix: "",
            imageUploader: {
            brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
            contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
            allowUrls: true
            },
            onDemand: true,
            discardSelector: ".discard-answer"
            ,immediatelyShowMarkdownHelp:true
            });


            }
            });














            draft saved

            draft discarded


















            StackExchange.ready(
            function () {
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53474361%2fhow-can-get-the-reproduce-test-procedure-for-the-vulnerabilities-reported-by-nes%23new-answer', 'question_page');
            }
            );

            Post as a guest















            Required, but never shown

























            1 Answer
            1






            active

            oldest

            votes








            1 Answer
            1






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes









            0














            Have you checked the code in the related NASL (http_method_format_string.nasl) as well as the include files?
            Check this page to locate the Plugin Directory






            share|improve this answer






























              0














              Have you checked the code in the related NASL (http_method_format_string.nasl) as well as the include files?
              Check this page to locate the Plugin Directory






              share|improve this answer




























                0












                0








                0







                Have you checked the code in the related NASL (http_method_format_string.nasl) as well as the include files?
                Check this page to locate the Plugin Directory






                share|improve this answer















                Have you checked the code in the related NASL (http_method_format_string.nasl) as well as the include files?
                Check this page to locate the Plugin Directory







                share|improve this answer














                share|improve this answer



                share|improve this answer








                edited Dec 1 '18 at 16:31

























                answered Dec 1 '18 at 16:19









                yaningoyaningo

                112




                112
































                    draft saved

                    draft discarded




















































                    Thanks for contributing an answer to Stack Overflow!


                    • Please be sure to answer the question. Provide details and share your research!

                    But avoid



                    • Asking for help, clarification, or responding to other answers.

                    • Making statements based on opinion; back them up with references or personal experience.


                    To learn more, see our tips on writing great answers.




                    draft saved


                    draft discarded














                    StackExchange.ready(
                    function () {
                    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53474361%2fhow-can-get-the-reproduce-test-procedure-for-the-vulnerabilities-reported-by-nes%23new-answer', 'question_page');
                    }
                    );

                    Post as a guest















                    Required, but never shown





















































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown

































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown







                    Popular posts from this blog

                    404 Error Contact Form 7 ajax form submitting

                    How to know if a Active Directory user can login interactively

                    Refactoring coordinates for Minecraft Pi buildings written in Python