top | item 2924156

Apache vulnerable to easy DOS attack - workaround available

111 points| ck2 | 14 years ago |mail-archives.apache.org | reply

22 comments

order
[+] ck2|14 years ago|reply
Of all the workarounds, this is probably the best option because it will still allow ranges to function.

  Option 1: (Apache 2.0 and 2.2)

          # Drop the Range header when more than 5 ranges.
          # CVE-2011-3192
          SetEnvIf Range (,.*?){5,} bad-range=1
          RequestHeader unset Range env=bad-range

          # optional logging.
          CustomLog logs/range-CVE-2011-3192.log common env=bad-range

  Option 2: (Also for Apache 1.3)

          # Reject request when more than 5 ranges in the Range: header.
          # CVE-2011-3192
          #
          RewriteEngine on
          RewriteCond %{HTTP:range} !(^bytes=[^,]+(,[^,]+){0,4}$|^$)
          RewriteRule .* - [F]
[+] nickthedart|14 years ago|reply
Additional info : Changing this slightly to drop range header when more than 10 ranges (i:e the 5 on the third line becomes a 10 instead ), can avoid problems where serving of large pdfs get broken by this fix.
[+] jarin|14 years ago|reply
Making sure ranges work is especially important if you're serving up streaming video.
[+] whyleyc|14 years ago|reply
I've been testing this fix today on Apache 2.0.53 and observed that when running the attack script against a server patched with option 1 (minus the optional logging) there was still a significant hike in CPU usage, perhaps because there is a cost in processing the header analysis.

Option 2 produced no such hike, and protected the server from attack.

[+] jjanzer|14 years ago|reply
I created a little mini site that lets you check if your server is vulnerable, along with some information about the exploit: http://apache-range-exploit.com/
[+] rvanniekerk|14 years ago|reply
Just a quick note from the advisory site

"When using a third party attack tool to verify vulnerability - know that most of the versions in the wild currently check for the presence of mod_deflate; and will (mis)report that your server is not vulnerable if this module is not present. This vulnerability is not dependent on presence or absence of that module."

Not sure if that's how you are checking for vulnerability, however it was reporting that my site was "not vulnerable" when it was very much so.

[+] ck2|14 years ago|reply

   created Thu, 25 Aug 2011 14:32:30 UTC
Wow, that's nice and clean for a morning project (and thanks!)
[+] aw3c2|14 years ago|reply
I would have never thought one could request multiple ranges in the first place. How does that work (multiple connections?) and of what use it is?
[+] pielud|14 years ago|reply
You make a request for several ranges of a file using the range header, something like:

Range: bytes=100-200, 600-800, 1500-

If the server supports ranges, it will respond with a 206 Partial Content status, and send a multipart/byteranges response body, which looks like this http://www.freesoft.org/CIE/RFC/2068/225.htm. Basically a delimited string containing all the ranges.

This is useful for some streaming audio/video formats and especially for large pdfs. IIRC, pdfs typically have header information at the end of the file, so it's useful for a pdf reader to get the end of the file first.

[+] kevingadd|14 years ago|reply
One hypothetical use would be for dealing with formats that have both headers and footers: For example, an MP3 will have a frame header at the start of every frame, so you'd want the beginning of the file to get that header. But you'd also want the last few KB of the MP3, because ID3 tags go there.
[+] chalst|14 years ago|reply
For sites that don't serve large files, option #4, disabling the range header, is the simplest option.

Note that this means that downloads are not resumable, which can easily annoy site users even if there is no multimedia involved. You only need to specify one range in the header in this case, but to do that you need option #1.

[+] ck2|14 years ago|reply
I guess you could just allow ONE range which seems like a good compromise and defeat the attack?

     RewriteCond %{HTTP:range} !(^bytes=[^,]+(,[^,]+){0,1}$|^$)
     RewriteRule .* - [F]
(for those that don't speak regex: the 0,1 allows either one or none range headers to be accepted, more or less will fail to be served anything)

That will allow downloads to still resume and it works in any version of apache.

[+] js4all|14 years ago|reply
It would be nice to mention in the title that Apache Web Server is affected. Apache has many products out there.
[+] rmc|14 years ago|reply
Although pedantically correct, it is quite common for people to use thee term "Apache" to refer to the web server. The folder for settings is "/etc/apache2" on debian based distros for example.