module

Apache Range Header DoS (Apache Killer)

Disclosed
2011-08-19
Created
2018-05-30

Description

The byterange filter in the Apache HTTP Server 2.0.x through 2.0.64, and 2.2.x
through 2.2.19 allows remote attackers to cause a denial of service (memory and
CPU consumption) via a Range header that expresses multiple overlapping ranges,
exploit called "Apache Killer".

Authors

Kingcope
Masashi Fujiwara
Markus Neis markus.neis@gmail.com

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use auxiliary/dos/http/apache_range_dos
msf auxiliary(apache_range_dos) > show actions
...actions...
msf auxiliary(apache_range_dos) > set ACTION < action-name >
msf auxiliary(apache_range_dos) > show options
...show and set options...
msf auxiliary(apache_range_dos) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.