SHARE
Facebook X Pinterest WhatsApp

Apache Confirms Web Server DoS Vulnerability, Promises Quick Patch

A denial-of-service tool that exploits a security flaw in the Apache Web server software is available in the wild. The Apache team is working on a fix and is expected to roll it out over the next few days. Called "Apache Killer," the DoS tool appeared Aug. 19 on the "Full Disclosure" security mailing list. […]

Aug 26, 2011
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

A denial-of-service tool that exploits a security flaw in the Apache Web server software is available in the wild. The Apache team is working on a fix and is expected to roll it out over the next few days.

Called "Apache Killer," the DoS tool appeared Aug. 19 on the "Full Disclosure" security mailing list. The Apache Software Foundation acknowledged on Aug. 24 that the vulnerability the tool targets existed, and promised a fix for Apache 2.0 and 2.2 "in the next 96 hours."

Apache is the most widely used Web server software in the world, accounting for 65.2 percent of all such software currently in use, according to United Kingdom-based security consultancy Netcraft. The Apache team said all versions of the software in the 1.3 and 2.0 lines have the DoS bug and are vulnerable to attack. Apache 1.3 is no longer supported and administrators should have moved on to more recent versions already.

"An attack tool is circulating in the wild. Active use of this tool has been observed," according to a security advisory from the Apache project.

The Web server software has a flaw in how multiple overlapping HTTP ranges are handled, the team said in the security advisory. The attack can be launched remotely and a "modest number of requests" can consume significant amounts of memory and CPU on the server, according to the advisory.

The bug was first reported in 2007 on the bugtraq Website by Michal Zalewski, a Google security engineer. Zalewski had said at the time that launching a DoS attack taking advantage of the flaw would be simplistic.

"A lone, short request can be used to trick the server into firing gigabytes of bogus data into the void, regardless of the server file size, connection count, or keep-alive request number limits implemented by the administrator. Whoops?" he wrote in the initial report.

A researcher under the name of Kingcope posted about the bug on Full Disclosure last week. The post was accompanied by a Perl script to execute an attack that could exhaust the memory of a remote Apache server "rather quickly," Ryan Barnett, senior security researcher at Trustwave wrote on the SpiderLAbs Anterior blog Aug. 24.

When executed, the script sends malicious HTTP Range Request headers for large amounts of data. Apache breaks up large requests in smaller chunks, but the malicious request is sizeable enough that system resources get tied up processing each of the chunks, according to Barnett.

"It appears due to its lack of sophistication, that it did not get much attention by Apache developers and it has remained unpatched all of this time," said Kevin Shortt, an incident handler at SAN Institute’s Internet Storm Center.

To read the original eWeek article, click here: Apache Confirms DoS Vulnerability in Web Server, Promises Quick Patch

Recommended for you...

SailPoint Intros Accelerated Application Management Solution
Jordan Smith
Aug 22, 2025
ConnectWise Partners with Proofpoint on Security in Asio
Jordan Smith
Aug 22, 2025
RegScale CRO on Channel Growth in Risk & Compliance
Victoria Durgin
Aug 22, 2025
Manny Rivelo on Evolving Channel & How MSPs Can Get Ahead
Victoria Durgin
Aug 20, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.