NT IIS Malformed HTTP Request Header DoS Vulnerability [_/info\_] [_/discussion\_] [_/exploit\_] [_/solution\_] [_/credit\_] [_/help\_] Quoted from Nobuo Miwa's post to Bugtraq: Simple play. I sent lots of "Host:aaaaa...aa" to IIS like... GET / HTTP/1.1 Host: aaaaaaaaaaaaaaaaaaaaaaa....(200 bytes) Host: aaaaaaaaaaaaaaaaaaaaaaa....(200 bytes) ...10,000 lines Host: aaaaaaaaaaaaaaaaaaaaaaa....(200 bytes) I sent twice above request sets. Then somehow victim IIS got memory leak after these requests. Of course, it can not respond any request any more. If you try this, you should see memory increase through performance monitor. You would see memory increase even after those requests finished already. It will stop when you got shortage of virtual memory. After that, you might not be able to restart web service and you would restart computer. I tried this against Japanese and English version of Windows NT. Copyright 1999 Security-Focus.Com, All Rights Reserved disclaimer