Apache squashes 'devastating' bug under attack
Byte range vuln exposed servers to crippling DoS exploit
Maintainers of the open-source Apache webserver have fixed a severe weakness that attackers are exploiting to crash websites.
Flaws in Apache's HTTP daemon made it easy to crash servers using publicly available software released last week. The bugs in the way the HTTPD processed multiple web requests that involved overlapping byte ranges allowed attackers to overwhelm servers by sending them a modest amount of traffic.
“We consider this release to be the best version of Apache available, and encourage users of all prior versions to upgrade,” the advisory stated. "Active use" of the attack tool has been observed.
One of the bugs fixed in the update was specific to Apache, while a second flaw has been known since 2007, and possibly involves all webservers, an Apache bulletin said. The Internet Engineering Task Force is considering changing the underlying protocol responsible for the problem, Apache said.
Versions 1.3.x and 2.0.x through 2.0.64 contain the denial-of-service vulnerabilities. They can be triggered by a single web request that contains overlapping byte ranges for a specific page.
“The problem is that currently such requests internally explode into 100's of large fetches, all of which are kept in memory in an inefficient way,” Apache's advisory explained. “This is being addressed in two ways. By making things more efficient. And by weeding out or simplifying requests deemed too unwieldy.” ®
Sponsored: Are DLP and DTP still an issue?