Major Security Advice:
Description of the problem:
As you probably noticed, on August, 24, a Security Advisory has been given according Apache Webserver 2.x.
On August, 26, a new update has been published:
Based on a bug in the processing of Byte-Range-Headers, the Webserver can be forced to overload. Multiple
http connections and simultaneous GET requests with a special byte-range-header result in a vulnerability that
affect Apache Webservers which have been delivered with an Enfinity Suite Installation.
Adjustment:
Apache provides several possible workarounds. We suggest you use the „Mitigation: 1), Option 1“
from the upper article.
Limit the Range-Requests by using the configuration "RequestHeader unset Range".
Therefore, the httpd.conf in the Main section has to be adjusted. Please include the following
lines:
# Drop the Range header when more than 5 ranges.
# CVE-2011-3192
SetEnvIf Range (,.*?){5,} bad-range=1
RequestHeader unset Range env=bad-range
ATTENTION: Some older Apache version throw an error when starting with this settings:
Syntax error on line xxx of /etc/opt/intershop/eserver1/httpd/httpd.conf: header unset takes two
arguments
In this case please use „Mitigation: 1), Option 2“ from the upper article: Make sure mod_rewrite is
loaded and insert these settings in httpd.conf
# Reject request when more than 5 ranges in the Range: header.
# CVE-2011-3192
#
RewriteEngine on
RewriteCond %{HTTP:range} !(^bytes=[^,]+(,[^,]+){0,4}$|^$)
RewriteRule .* - [F]
Please first test this workaround on a test system, because we cannot evaluate all possible side effects on
individualized systems and therefore cannot give guarantees.
Next step:
Apache has already reacted and prospected an Update. As soon as this is available, we will check if Intershop
needs to take actions. If that is the cause, we will inform you right away.
Note: On September 12, 2011 a Custom Fix for Apache 2.2.20 has been published, regarding all Enfinity 6.4 systems.
|