The Content-Length field specifies the size of the transmitted form of data after the request header. In an attack, the Content-Length field contains a very high value, meaning the server will expect to receive a large amount of data. The header of the spoofed request is then validly terminated, then an attacker waits and sends another small piece of data before the connection termination timer expires. In this way, the connection keeps dangerously active.
- Lead to exhaust all available server resources.
- Use technique to exhaust all available server resources.
- Exhaust the victim's network and hardware resources when requesting large amounts of data.
- Set the header and message body to a maximum reasonable length.
- Define a minimum incoming data rate, and drop those that are slower.
- Set an absolute connection timeout.
Anonymous attacker with local access.
⌚ 60 minutes.
Default score using CVSS 3.1. It may change depending on the context of the src.
Default score using CVSS 4.0. It may change depending on the context of the src.