Apache Issues Workarounds For 'Killer' Attack
Development team spells out mitigation strategies for DDoS threat in advance of patch release.
A working proof-of-concept christened the "Apache Killer" released this week uses an as-yet unpatched flaw in the server software that pounds Apache servers with a distributed denial of service (DDoS) attack--and all it would take is one machine to bring the server to its knees.
The Apache development team late Wednesday issued an alert and workarounds in advance of rolling out a patch for the flaw in Apache HTTPD Web Server 1.3 and 2.X. The Apache Killer lets an attacker use a single PC to wage a denial of service attack against an Apache server.
"By sending specially crafted HTTP requests which include malformed range HTTP header, an attacker can disrupt the normal function of the Web server, thus disallowing legitimate users to receive responses from the Web server," the team's advisory said. "This issue affects all Apache software versions and a patch has not been released yet."
The underlying flaw was apparently first reported on bugtraq in 2007. "It appears due to its lack of sophistication that it did not get much attention by Apache developers and it has remained unpatched all of this time," wrote Kevin Shortt of the SANS Internet Storm Center, who noted that he had not yet tested the proof of concept (PoC), but planned to.
Meanwhile, vendors were stepping forward Thursday announcing their protections against the Apache Killer attack.
Sourcefire said its IPS and open-source Snort technology have been able to detect this flaw for several years and that its vulnerability research team Thursday beefed up that protection with a new rule specific to the Apache Killer.
Read the rest of this article on Dark Reading.
The vendors, contractors, and other outside parties with which you do business can create a serious security risk. Here's how to keep this threat in check. Also in the new, all-digital issue of Dark Reading: Why focusing solely on your own company's security ignores the bigger picture. Download it now. (Free registration required.)
About the Author
You May Also Like
Unleashing AI to Assess Cyber Security Risk
Nov 12, 2024Securing Tomorrow, Today: How to Navigate Zero Trust
Nov 13, 2024The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response
Nov 20, 2024