The vulnerability is known as "Apache Killer".
Vulnerability details
Advisory: SB2011082301 - Denial of service in Apache HTTP Server
Vulnerable component: Apache HTTP Server
CVE-ID: CVE-2011-3192
CVSSv3 score: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:F/RL:O/RC:C
CWE-ID: CWE-400 - Resource exhaustion
Description:
The vulnerability allows a remote attacker to cause DoS conditions on the target system.
The weakness exists due to an error in the ByteRange filter when processing malicious requests in Apache HTTP server. A remote attacker can send a specially crafted HTTP request containing an overly large Range header, exhaust all available memory resources and trigger the application to crash.
Successful exploitation of the vulnerability results in denial service on the vulnerable system.
Note: the vulnerability was being actively exploited.
Public Exploits:
- Apache - Denial of Service [Exploit-DB]
- Apache - Remote Denial of Service (Memory Exhaustion) [Exploit-DB]
External links:
http://httpd.apache.org/security/CVE-2011-3192.txt
https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00006.html
http://www.gossamer-threads.com/lists/apache/dev/401638
http://mail-archives.apache.org/mod_mbox/httpd-announce/201108.mbox/%3C20110824161640.122D387DD@mino...
http://mail-archives.apache.org/mod_mbox/httpd-announce/201108.mbox/%3C20110826103531.998348F82@mino...
http://www.oracle.com/technetwork/topics/security/alert-cve-2011-3192-485304.html
https://blogs.oracle.com/security/entry/security_alert_for_cve_2011
https://wiki.apache.org/httpd/CVE-2011-3192
http://dino.ciuffetti.info/2011/08/cve-2011-3192-apachekiller/