Vigil@nce - Apache httpd: denial of service via mod_deflate
August 2014 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can send special data to Apache httpd with mod_deflate
as an Input Filter, in order to trigger a denial of service.
Impacted products: Apache httpd, Debian, Fedora, MBS, RHEL,
Slackware, Ubuntu
Severity: 2/4
Creation date: 17/07/2014
DESCRIPTION OF THE VULNERABILITY
The mod_deflate module of Apache httpd compresses/uncompresses
data.
The decompression of the HTTP body is for example enabled with:
SetInputFilter DEFLATE
However, in this case, special data lead to the consumption of
several resources.
An attacker can therefore send special data to Apache httpd with
mod_deflate as an Input Filter, in order to trigger a denial of
service.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Apache-httpd-denial-of-service-via-mod-deflate-15067