Proxyとか

ネット界隈と時事ニュースなどの日常の何気ない話題が中心な信憑性もなければ公平性もない偏った素人のメモ。

 http://fula.jp/ へのリンクはフリーです [メール] [PGP] はこちらよりどうぞ。但し、営利目的の方はご遠慮下さい。    携帯    English    韓国語    中文

<< 201109のログ | TOP | 201104のログ >>

[Server]  Apache HTTP Server 2.2.20 Released

 more・・

「Apache Killer」Range header DoS vulnerability Apache HTTPD 1.3/2.x (CVE-2011-3192) への対応修正版 Apache HTTP Server 2.2.20 がリリースされました。


Changes with Apache 2.2.20
*) SECURITY: CVE-2011-3192 (cve.mitre.org)
core: Fix handling of byte-range requests to use less memory, to avoid
denial of service. If the sum of all ranges in a request is larger than
the original file, ignore the ranges and send the complete file.
PR 51714. [Stefan Fritsch, Jim Jagielski, Ruediger Pluem, Eric Covener]

*) mod_authnz_ldap: If the LDAP server returns constraint violation,
don't treat this as an error but as "auth denied". [Stefan Fritsch]

*) mod_filter: Fix FilterProvider conditions of type "resp=" (response
headers) for CGI. [Joe Orton, Rainer Jung]

*) mod_reqtimeout: Fix a timed out connection going into the keep-alive
state after a timeout when discarding a request body. PR 51103.
[Stefan Fritsch]

*) core: Do the hook sorting earlier so that the hooks are properly sorted
for the pre_config hook and during parsing the config. [Stefan Fritsch]

[Apache 2.1.0-dev includes those bug fixes and changes with the
Apache 2.0.xx tree as documented, and except as noted, below.]

Changes with Apache 2.0.x and later:

*) http://svn.apache.org/viewvc/httpd/httpd/branches/2.0.x/CHANGES?view=markup

セキュリティーバージョンなので速やかにアップデートしましょう。

Apache 2.2.20 Download

サイト内関連記事
Apacheの脆弱性を攻撃するツール Apache Killer 対策

[2011/08/31(Wed) 11:39:47] [admin] [Comments:0] [Trackbacks:0]

[Server]  Apacheの脆弱性を攻撃するツール Apache Killer 対策

 more・・

「Apache Killer」が流行っているようです。被害を受けるApacheは1.3系および2系の全バージョン。
48時間以内にリリースされるであろうパッチリリースまで各自での対策が必要です。

対策方法
Range header DoS vulnerability Apache HTTPD 1.3/2.x (CVE-2011-3192)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Apache HTTPD Security ADVISORY
==============================

Title: Range header DoS vulnerability Apache HTTPD 1.3/2.x

CVE: CVE-2011-3192:
Date: 20110824 1600Z
Product: Apache HTTPD Web Server
Versions: Apache 1.3 all versions, Apache 2 all versions

Description:
============

A denial of service vulnerability has been found in the way the multiple
overlapping ranges are handled by the Apache HTTPD server:

http://seclists.org/fulldisclosure/2011/Aug/175

An attack tool is circulating in the wild. Active use of this tools has
been observed.

The attack can be done remotely and with a modest number of requests can
cause very significant memory and CPU usage on the server.

The default Apache HTTPD installation is vulnerable.

There is currently no patch/new version of Apache HTTPD which fixes this
vulnerability. This advisory will be updated when a long term fix
is available.

A full fix is expected in the next 48 hours.

Mitigation:
============

However there are several immediate options to mitigate this issue until
a full fix is available:

1) Use SetEnvIf or mod_rewrite to detect a large number of ranges and then
either ignore the Range: header or reject the request.

Option 1: (Apache 2.0 and 2.2)

# Drop the Range header when more than 5 ranges.
# CVE-2011-3192
SetEnvIf Range (,.*?){5,} bad-range=1
RequestHeader unset Range env=bad-range

# optional logging.
CustomLog logs/range-CVE-2011-3192.log common env=bad-range

Option 2: (Also for Apache 1.3)

# Reject request when more than 5 ranges in the Range: header.
# CVE-2011-3192
#
RewriteEngine on
RewriteCond %{HTTP:range} !(^bytes=[^,]+(,[^,]+){0,4}$|^$)
RewriteRule .* - [F]

The number 5 is arbitrary. Several 10's should not be an issue and may be
required for sites which for example serve PDFs to very high end eReaders
or use things such complex http based video streaming.

2) Limit the size of the request field to a few hundred bytes. Note that while
this keeps the offending Range header short - it may break other headers;
such as sizeable cookies or security fields.

LimitRequestFieldSize 200

Note that as the attack evolves in the field you are likely to have
to further limit this and/or impose other LimitRequestFields limits.

See: http://httpd.apache.org/docs/2.2/mod/core.html#limitrequestfieldsize

3) Use mod_headers to completely dis-allow the use of Range headers:

RequestHeader unset Range

Note that this may break certain clients - such as those used for
e-Readers and progressive/http-streaming video.

4) Deploy a Range header count module as a temporary stopgap measure:

http://people.apache.org/~dirkx/mod_rangecnt.c

Precompiled binaries for some platforms are available at:

http://people.apache.org/~dirkx/BINARIES.txt

5) Apply any of the current patches under discussion - such as:

http://mail-archives.apache.org/mod_mbox/httpd-dev/201108.mbox/%3cCAAPSnn2PO-d-C4nQt_TES2RRWiZr7urefhTKPWBC1b+K1Dqc7g@mail.gmail.com%3e

Actions:
========

Apache HTTPD users who are concerned about a DoS attack against their server
should consider implementing any of the above mitigations immediately.

When using a third party attack tool to verify vulnerability - know that most
of the versions in the wild currently check for the presence of mod_deflate;
and will (mis)report that your server is not vulnerable if this module is not
present. This vulnerability is not dependent on presence or absence of
that module.

Planning:
=========

This advisory will be updated when new information, a patch or a new release
is available. A patch or new apache release for Apache 2.0 and 2.2 is expected
in the next 48 hours. Note that, while popular, Apache 1.3 is deprecated.


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (Darwin)

iEYEARECAAYFAk5VI+MACgkQ/W+IxiHQpxsz4wCgipR6nQmd45hAgFmI/8dHULLF
BtoAmQGsi2efZKibpaSMI+aCt8fQgWgS
=11BG
-----END PGP SIGNATURE-----

世界中が大混乱するレベルの大きな脆弱性ですね

この記事の続きを読む・・・
[2011/08/26(Fri) 04:22:46] [admin] [Comments:0] [Trackbacks:0]

[Server]  04WebServer 1.91 リリース

 more・・

04WebServer 1.91 が数年ぶりにニューリリースされました。

04WebServer 1.91リリース <04WebServer ,News ,Release>

04WebServer 1.91リリース <04WebServer ,News ,Release>
更新日 2011/08/14 00:57:48
記事 04WebServer 1.91をリリースしました。

[更新点]
  • Windows Vista/7に対応
  • サーバコントローラが稀に起動しなくなる不具合を修正
  • 中間証明書の読み込みに対応(全ての証明書を1個の証明書ファイルに統合する必要あり)
  • WebDAVの互換性を向上(Windows7の「ネットワークの場所を追加する」、MacOS Xの「サーバへ接続」、iOSのGoodReaderで動作確認)
  • CGIでターゲットが実行ファイルでない場合、環境変数にREDIRECT_STATUSを設定するよう変更(PHPインタプリタ用)
  • ディレクトリ設定の上下移動機能を追加
  • SSLの秘密鍵・サイト証明書作成で、ビット強度を1024-8192の間で選択できるよう変更。

  • OpenSSLライブラリを1.0.0dへ更新
  • サーバ・コントローラ間の通信方法をCOMから名前付きパイプに変更
  • 開発環境をVisualStudio 2008に変更
  • インストーラの開発環境をWix 3.5に変更
  • MSBuildによるビルド環境を整備

04WebServerはWindowsで動作するWebServerソフトです。Apacheより格段に簡単にWebServerを構築することが出来ます。文字コード等を気にする事無く、日本語環境でWebDAVを簡単に構築できる事も特記したいと思います。Apacheと同等な複雑な動きは出来ませんが、個人で使う分には速度も十分に実用域だと思います。

[2011/08/15(Mon) 10:19:15] [admin] [Comments:0] [Trackbacks:0]

<< 201109のログ | TOP | 201104のログ >>

apache_powered.gif php5_powered.gif eaccelerator_powered.gif zend_optimizer_powered.gif xmail_powered.gif opera9_browser.gif

FLEUGELz