Advertisement
Help Keep Boards Alive. Support us by going ad free today. See here: https://subscriptions.boards.ie/.
If we do not hit our goal we will be forced to close the site.

Current status: https://keepboardsalive.com/

Annual subs are best for most impact. If you are still undecided on going Ad Free - you can also donate using the Paypal Donate option. All contribution helps. Thank you.
https://www.boards.ie/group/1878-subscribers-forum

Private Group for paid up members of Boards.ie. Join the club.

Apache DoS attack

  • 18-06-2009 08:50PM
    #1
    Closed Accounts Posts: 1,567 ✭✭✭


    Yesterday an interesting HTTP DoS tool has been released. The tool performs a Denial of Service attack on Apache (and some other, see below) servers by exhausting available connections. While there are a lot of DoS tools available today, this one is particularly interesting because it holds the connection open while sending incomplete HTTP requests to the server.

    In this case, the server will open the connection and wait for the complete header to be received. However, the client (the DoS tool) will not send it and will instead keep sending bogus header lines which will keep the connection allocated.
    The initial part of the HTTP request is completely legitimate:

    GET / HTTP/1.1\r\n
    Host: host\r\n
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 1.1.4322; .NET CLR 2.0.503l3; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; MSOffice 12)\r\n
    Content-Length: 42\r\n
    

    After sending this the client waits for certain time – notice that it is missing one CRLF to finish the header which is otherwise completely legitimate. The bogus header line the tools sends is currently:
    X-a: b\r\n
    

    Which obviously doesn't mean anything to the server so it keeps waiting for the rest of the header to arrive.

    Its funny how something like this wasn't exploited before..

    http://isc.sans.org/


Comments

  • Closed Accounts Posts: 751 ✭✭✭JimmyCrackCorn!


    It takes someone special in security to think outside the norm.

    C was over 10 yeas old before someone thought of putting %s %f into its input buffers to make it poo itself. After that everyone tried it.


  • Closed Accounts Posts: 1,567 ✭✭✭Martyr


    i'm convinced this was documented long before yesterday, just surprised versions of apache server were vulnerable to it.


Advertisement