The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Artofdefence Hyperguard Web Application Firewall: Remote Denial of Service


<< Previous INDEX Search src / Print Next >>
Subject: Artofdefence Hyperguard Web Application Firewall: Remote Denial of Service
Date: Wed, 1 Jul 2009 08:26:16 +0200
Message-ID: <64892268E6E1E3419169504697FC7E555B1B82@MXBE02.fhs-hagenberg.ac.at.>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: Artofdefence Hyperguard Web Application Firewall: Remote Denial of Service
Thread-Index: Acn6FNbQq3EaVcmiQeO7qOUgOe0+yg==
From: "Kirchner Michael" <sec08003@fh-hagenberg.at.>
To: <bugtraq@securityfocus.com.>
X-OriginalArrivalTime: 01 Jul 2009 06:26:24.0368 (UTC) FILETIME=[DB61CF00:01C9FA14]
X-Virus-Scanned: antivirus-gw at tyumen.ru


Security Advisory
---------------------------------------
Vulnerable Software: 	Artofdefence Hyperguard Web Application Firewall
Vulnerable Version:	3 branches: prior to 3.1.1-11637; prior to
3.0.3-11636; prior to 2.5.5-11635 (Apache Plug-in)=20
Homepage:			http://www.artofdefence.com/
Found by:			Michael Kirchner, Wolfgang Neudorfer,
Lukas Nothdurfter (Team h4ck!nb3rg) =20
Impact:			Remote Denial of Service


Product Description
---------------------------------------
Hyperguard is a latest-generation enterprise Web application firewall
with attack detection and attack protection functions that are freely
configurable. Hyperguard enables centralised security monitoring,
reporting and alerting and provides custom protection for your Web
applications against external attacks.
[Source: http://www.artofdefence.com/en/hyperguard/hyperguard.html&#093;


Vulnerability Description
---------------------------------------
The Artofdefence Hyperguard Web Application Firewall operates as a
reverse proxy module between the clients and the web server to be
protected. All HTTP requests are checked before being forwarded to the
web server. By sending specially crafted HTTP POST requests an attacker
is able to trigger high memory usage on the WAF. By repeatedly sending
the request the available memory is exhausted resulting in a kernel
panic and therefore a denial of service.
The vulnerability can be triggered by sending HTTP POST requests with a
high "Content-Length" header value set but without transmitting any
content. Artofdefence Hyperguard is available as a plug-in for several
web servers. The vulnerability was confirmed in connection with the
Apache web server module. Other modules have not been tested.


Proof of Conept
---------------------------------------
With 1 GB of free memory available on the WAF the kernel panic occured
after sending ~350 crafted requests.


Vulnerable Versions
---------------------------------------
The tested version was of the 3.1.1 branch prior to 3.1.1-11637.
According to the vendor the other two branches were also vulnerable (see
version description in the header).


Patch
---------------------------------------
The vendor provides an updated version of the product for all three
branches (see version description in the header).


Contact Timeline
---------------------------------------
2009-05-22: Vendor informed
2009-05-22: Inital vendor reply
2009-05-25: Vulnerability confirmed
2009-05-29: Patched version available
2009-07-01: Public release=20


Further information
---------------------------------------
Information about the web application firewall project this advisory
originates from can be found at:
http://www.h4ck1nb3rg.at/wafs/



<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру