You are here

IIS Web Server: Vulnerability in HTTP.sys Could Allow Remote Code Execution

IDs: 
CVE-2015-1635, MS15-034
Keywords: 
IIS, Buffer Overflow
Description: 

Microsoft released patches for a critical vulnerability in the Windows module HTTP.sys which affects the IIS web server [1]. The vulnerability may allow remote code execution.

Public exploit code shows that a buffer overflow can be caused by crafting a special HTTP request with large Range header values.

Airlock WAF itself is not affected because Microsoft Windows is not used.

Resolution: 

For affected IIS back-ends we recommend to apply the patches provided by Microsoft [1].

If you can not immediately apply the patches, you can configure a deny rule on Airlock WAF to prevent unrealistic large integer values in a Range header.

Since details of the vulnerability are not yet public, we can not guarantee that the deny rule completely prevents exploitation of the vulnerability. In any case, vulnerable systems should be patched as soon as possible.

Pattern for header name (case sensitive = OFF, invert = OFF):

^Range$

Pattern for header value (case sensitive = ON, invert = OFF):

\b[0-9]{16,}\b

 

Component: 
Airlock
Airlock Vulnerability Status: 
Does not affect Airlock
Back-end Vulnerability Status: 
Back-ends may be vulnerable, see resolution