Download presentation
Presentation is loading. Please wait.
Published byJuliet Cannon Modified over 9 years ago
1
HTTP.sys Vulnerability CVE-2015-1635 MS15-034 Johannes B. Ullrich, Ph.D. jullrich@sans.edu 1
2
Outline What is HTTP.sys? What does the “Range” header do? How is it exploited? How to test if you are vulnerable Examples of Current Exploits in the Wild 2
3
No Logo? No Catchy Name HTTP deRANGEd 3
4
HTTP.sys Parses HTTP Requests Caches response using kernel caching If a “Range” header is used, extracts specific portion of page from Kernel Cache to pass to client Used in IIS 6 and later. NOT JUST USED BY IIS (part of Windows) 4
5
Range Header (RFC 7233) Used for partial downloads Often used to complete downloads Mobile clients (podcast clients) download pages in “chunks”. GET / HTTP/1.1 Host: test Range: bytes=0-5,10-15 5
6
Range Header Response HTTP/1.1 206 Partial Content Content-Type: multipart/byteranges; boundary=513da661b3ac6e --513da661b3ac6e Content-type: text/html; charset=UTF-8 Content-range: bytes 0-5/15 --513da661b3ac6e Content-type: text/html; charset=UTF-8 6
7
No Upper Limit “Since there is no predefined limit to the length of a payload, recipients must anticipate potentially large decimal numerals and prevent parsing errors due to integer conversion overflows.” (RFC 7233) 7
8
Exploit IIS limits the range to a 64 Bit Unsigned number. Maximum Number: 2^64-1 18446744073709551615 0xFFFFFFFFFFFFFF If lower end 0 -> No exploit 8
9
Exploit (2) Lower end > Size of file: No exploit Lower end > 0 and <=Size of file: Exploit!! Integer Overflow 9
10
Exploit Request GET / HTTP/1.1 Host: test Range: bytes=x- 18446744073709551615 X=0 no exploit X>0 and X<Filesize Exploit 10
11
Information Leak If “lower end” = “file size - 1” Not reproducable in my testing Dumps kernel memory (same segment as “cache”?) Maximum size depends on size of file 11
12
Tests Send large HTTP Range request with lower end 0.. Other Software using http.sys netsh http show servicestate Check if patch is installed wmic qfe | find KB3042553 12
13
Other Protections I(D|P)S: Does not work for SSL Host based IPS e.g. Symantec has signatures that block exploit WAF Authentication: Disable Anonymous Access 13
14
Current Exploits Many vulnerability scans (range starts at “0”) Some random DoS exploit attempts No Information Disclosure exploits in honeypot so far Reports of more targeted exploit attempts. 14
15
Risk Exposed Public Systems are at immediate risk of DoS Memory Disclosure likely “stable” in a couple days Remote Execution unlikely (in the near future) 15
16
What to do next? Expedite Patching MS15-034 Consider “virtual patching” via WAF until patch is applied and verified Add IDS rules to detect exploit attempts Please… share anything you see! Is it as bad as Heartbleed? No… 16
17
Questions? jullrich@sans.edu https://isc.sans.edu/presentations @johullrich Daily Podcast… 17
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.