lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <8AB094FC-738B-47D9-BEAE-192B01052ACB@webweaving.org> Date: Fri, 26 Aug 2011 12:34:13 +0100 From: Dirk-Willem van Gulik <dirkx@...weaving.org> To: Carlos Alberto Lopez Perez <clopez@...lia.com> Cc: full-disclosure@...ts.grok.org.uk Subject: Re: Advisory: Range header DoS vulnerability Apache HTTPD 1.3/2.x (CVE-2011-3192) On 26 Aug 2011, at 12:09, Carlos Alberto Lopez Perez wrote: > RewriteEngine on > RewriteCond %{HTTP:range} !(^bytes=[^,]+(,[^,]+){0,4}$|^$) [NC,OR] > RewriteCond %{HTTP:request-range} !(^bytes=[^,]+(,[^,]+){0,4}$|^$) [NC] > RewriteRule .* - [F] > > Because if you don't specify the [OR] apache will combine the rules > making an AND (and you don't want this!). > > Also use NC=(nocase) to prevent the attacker upper casing "bytes=" > (don't know if it will work.. but just to prevent) Thank you - will double check & add in next/final advisory. Dw. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists