Development team spells out mitigation strategies for DDoS threat in advance of patch release.
A working proof-of-concept christened the "Apache Killer" released this week uses an as-yet unpatched flaw in the server software that pounds Apache servers with a distributed denial of service (DDoS) attack--and all it would take is one machine to bring the server to its knees.
The Apache development team late Wednesday issued an alert and workarounds in advance of rolling out a patch for the flaw in Apache HTTPD Web Server 1.3 and 2.X. The Apache Killer lets an attacker use a single PC to wage a denial of service attack against an Apache server.
"By sending specially crafted HTTP requests which include malformed range HTTP header, an attacker can disrupt the normal function of the Web server, thus disallowing legitimate users to receive responses from the Web server," the team's advisory said. "This issue affects all Apache software versions and a patch has not been released yet."
The underlying flaw was apparently first reported on bugtraq in 2007. "It appears due to its lack of sophistication that it did not get much attention by Apache developers and it has remained unpatched all of this time," wrote Kevin Shortt of the SANS Internet Storm Center, who noted that he had not yet tested the proof of concept (PoC), but planned to.
Meanwhile, vendors were stepping forward Thursday announcing their protections against the Apache Killer attack.
Sourcefire said its IPS and open-source Snort technology have been able to detect this flaw for several years and that its vulnerability research team Thursday beefed up that protection with a new rule specific to the Apache Killer.
The vendors, contractors, and other outside parties with which you do business can create a serious security risk. Here's how to keep this threat in check. Also in the new, all-digital issue of Dark Reading: Why focusing solely on your own company's security ignores the bigger picture. Download it now. (Free registration required.)
Published: 2017-05-08 unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).
Published: 2017-05-08 A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...
Published: 2017-05-08 Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.
Published: 2017-05-08 Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.