[<prev] [next>] [day] [month] [year] [list]
Message-ID: <64892268E6E1E3419169504697FC7E555B1B7B@MXBE02.fhs-hagenberg.ac.at>
Date: Wed, 1 Jul 2009 08:12:43 +0200
From: "Kirchner Michael" <sec08003@...hagenberg.at>
To: <full-disclosure@...ts.grok.org.uk>
Subject: Artofdefence Hyperguard Web Application Firewall:
Remote Denial of Service
Security Advisory
---------------------------------------
Vulnerable Software: Artofdefence Hyperguard Web Application
Firewall
Vulnerable Version: 3 branches: prior to 3.1.1-11637; prior to
3.0.3-11636; prior to 2.5.5-11635 (Apache Plug-in)
Homepage: http://www.artofdefence.com/
Found by: Michael Kirchner, Wolfgang
Neudorfer, Lukas Nothdurfter (Team h4ck!nb3rg)
Impact: Remote Denial of Service
Product Description
---------------------------------------
Hyperguard is a latest-generation enterprise Web application firewall
with attack detection and attack protection functions that are freely
configurable. Hyperguard enables centralised security monitoring,
reporting and alerting and provides custom protection for your Web
applications against external attacks.
[Source: http://www.artofdefence.com/en/hyperguard/hyperguard.html]
Vulnerability Description
---------------------------------------
The Artofdefence Hyperguard Web Application Firewall operates as a
reverse proxy module between the clients and the web server to be
protected. All HTTP requests are checked before being forwarded to the
web server. By sending specially crafted HTTP POST requests an attacker
is able to trigger high memory usage on the WAF. By repeatedly sending
the request the available memory is exhausted resulting in a kernel
panic and therefore a denial of service.
The vulnerability can be triggered by sending HTTP POST requests with a
high "Content-Length" header value set but without transmitting any
content. Artofdefence Hyperguard is available as a plug-in for several
web servers. The vulnerability was confirmed in connection with the
Apache web server module. Other modules have not been tested.
Proof of Conept
---------------------------------------
With 1 GB of free memory available on the WAF the kernel panic occured
after sending ~350 crafted requests.
Vulnerable Versions
---------------------------------------
The tested version was of the 3.1.1 branch prior to 3.1.1-11637.
According to the vendor the other two branches were also vulnerable (see
version description in the header).
Patch
---------------------------------------
The vendor provides an updated version of the product for all three
branches (see version description in the header).
Contact Timeline
---------------------------------------
2009-05-22: Vendor informed
2009-05-22: Inital vendor reply
2009-05-25: Vulnerability confirmed
2009-05-29: Patched version available
2009-07-01: Public release
Further information
---------------------------------------
Information about the web application firewall project this advisory
originates from can be found at:
http://www.h4ck1nb3rg.at/wafs/
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists