LWN: Comments on "Nasty Apache denial of service vulnerability" https://lwn.net/Articles/456268/ This is a special feed containing comments posted to the individual LWN article titled "Nasty Apache denial of service vulnerability". en-us Sun, 12 Oct 2025 15:55:53 +0000 Sun, 12 Oct 2025 15:55:53 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net Nasty Apache denial of service vulnerability https://lwn.net/Articles/456651/ https://lwn.net/Articles/456651/ happynut The vulnerability was updated. Request-range is vulnerable too: <ul> <li><a href="http://lists.grok.org.uk/pipermail/full-disclosure/2011-August/082427.html">http://lists.grok.org.uk/pipermail/full-disclosure/2011-August/082427.html</a></li> <li><a href="https://bugzilla.redhat.com/show_bug.cgi?id=732928">https://bugzilla.redhat.com/show_bug.cgi?id=732928</a></li> </ul> Sun, 28 Aug 2011 21:59:12 +0000 Nasty Apache denial of service vulnerability https://lwn.net/Articles/456407/ https://lwn.net/Articles/456407/ SEJeff <div class="FormattedComment"> Yup just trying to point it out for the TL;DNR people who are much like myself :)<br> </div> Thu, 25 Aug 2011 18:23:25 +0000 Nasty Apache denial of service vulnerability https://lwn.net/Articles/456405/ https://lwn.net/Articles/456405/ rickmoen Don't forget to do <blockquote> a2enmod headers </blockquote> ...or Apache httpd may choke on invalid configuration lines and refuse to start (if the 'headers' module isn't enabled). Rick Moen rick@linuxmafia.com Thu, 25 Aug 2011 18:18:35 +0000 Nasty Apache denial of service vulnerability https://lwn.net/Articles/456362/ https://lwn.net/Articles/456362/ ovitters <div class="FormattedComment"> I just copied that from this announcement. Yay for Puppet :P<br> </div> Thu, 25 Aug 2011 13:54:30 +0000 Nasty Apache denial of service vulnerability https://lwn.net/Articles/456357/ https://lwn.net/Articles/456357/ SEJeff <div class="FormattedComment"> Great fix for gnome.org servers from bkor for your apache config:<br> # Drop the Range header when more than 5 ranges.<br> # CVE-2011-3192<br> SetEnvIf Range (,.*?){5,} bad-range=1<br> RequestHeader unset Range env=bad-range<br> <p> Allows legit range requests to work and kills it after &gt; 5.<br> </div> Thu, 25 Aug 2011 13:00:01 +0000 Nasty Apache denial of service vulnerability https://lwn.net/Articles/456350/ https://lwn.net/Articles/456350/ tialaramex <div class="FormattedComment"> Let's not get ahead of ourselves, the Apache advisory itself says that some of the POC / test scripts don't actually work on a typical out-of-box install, not because it isn't vulnerable, but because they're making bad assumptions. Real bad guys could fix this, but obviously the Apache team isn't going to spell out how.<br> <p> If we look at Red Hat's security numbers we see that a significant number of POCs fail out-of-box against RHEL, but a knowledgeable hacker could fix them because RHEL was actually vulnerable. This means you're safer than you might appear to be against script kiddies (who won't know how) but could get a false sense of security if your adversaries are sophisticated. The same probably applies here to Apache on OpenBSD.<br> </div> Thu, 25 Aug 2011 11:02:53 +0000 Nasty Apache denial of service vulnerability https://lwn.net/Articles/456333/ https://lwn.net/Articles/456333/ etrusco <div class="FormattedComment"> If the fix was intentional and not communicated upstream, I "can't say nothing" for OpenBSD.<br> </div> Thu, 25 Aug 2011 07:53:56 +0000 Nasty Apache denial of service vulnerability https://lwn.net/Articles/456327/ https://lwn.net/Articles/456327/ imgx64 <div class="FormattedComment"> <font class="QuotedText">&gt;Versions: Apache 1.3 all versions</font><br> <p> That's not entirely true. It doesn't affect OpenBSD's fork according to <a rel="nofollow" href="http://marc.info/?l=openbsd-misc&amp;m=131424693000610&amp;w=2">http://marc.info/?l=openbsd-misc&amp;m=131424693000610&amp;...</a><br> </div> Thu, 25 Aug 2011 06:19:27 +0000 Nasty Apache denial of service vulnerability https://lwn.net/Articles/456301/ https://lwn.net/Articles/456301/ Hausvib6 <div class="FormattedComment"> This vulnerability can be a nice addition to LOIC. Fewer drones, more damages, though it's far easier to mitigate...<br> </div> Thu, 25 Aug 2011 02:02:26 +0000 Nasty Apache denial of service vulnerability https://lwn.net/Articles/456296/ https://lwn.net/Articles/456296/ sjlyall <div class="FormattedComment"> Amusingly the ad I'm getting next to this story is for "Neoload Web Stress Tool" <br> </div> Thu, 25 Aug 2011 01:20:11 +0000 Nasty Apache denial of service vulnerability https://lwn.net/Articles/456289/ https://lwn.net/Articles/456289/ jonabbey <div class="FormattedComment"> Note that the killapache.pl script linked from the fulldisclosure forum will report that a server is 'Not Vulnerable' if the '/' resource is provided by PHP, as PHP does not support the Range header.<br> <p> If such a server provides any image files, though, a URL for an image file can be substituted in the killapache script, whereupon the Range DoS attack will function just fine.<br> </div> Wed, 24 Aug 2011 23:21:21 +0000 Nasty Apache denial of service vulnerability https://lwn.net/Articles/456280/ https://lwn.net/Articles/456280/ jonabbey <div class="FormattedComment"> This seems remarkably bad. I'm surprised I've not heard more buzz about this on the social networks.<br> </div> Wed, 24 Aug 2011 21:38:51 +0000