Vigil@nce - Apache httpd mod_lua: denial of service via WebSocket PING
March 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can send a malicious PING message to Apache httpd
using mod_lua with a WebSocket, in order to trigger a denial of
service.
Impacted products: Apache httpd, openSUSE
Severity: 1/4
Creation date: 05/03/2015
DESCRIPTION OF THE VULNERABILITY
The mod_lua experimental module can be installed on Apache httpd,
in order to create extensions based on the Lua language.
The r:wsupgrade() function converts a connection to a WebSocket.
However, when a malicious PING message is received, a fatal error
occurs in the lua_websocket_read() function.
An attacker can therefore send a malicious PING message to Apache
httpd using mod_lua with a WebSocket, in order to trigger a denial
of service.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Apache-httpd-mod-lua-denial-of-service-via-WebSocket-PING-16302