-[ Exploit Announcement

Title: Cold Fusion Server 4.5.1 Denial-of-Service Attack using CFCACHE.
OS: Windows NT 4.0
Affected Product Versions: Cold Fusion Server 4.5.x, Professional &
Enterprise.

-[ Acknowledgements
Thanks are due to Patrick Keating, for his help diagnosing and discovering
this issue.

-[ Summary
ColdFusion is a complete Web application server for developing and
delivering scalable e-business applications. An included component of the
Cold Fusion Markup Language (CFML) tag set includes a tag called CFCACHE.
CFCACHE allows you to speed up pages considerably in cases where the dynamic
content doesn't need to be retrieved each time a user accesses the page. To
accomplish this, it creates temporary files that contain the static HTML
returned from a particular run of the ColdFusion page.

-[ The Exploit
It is possible to cause the Cold Fusion Server service to hang and stop
responding to client requests when requesting a cache file that isn't stored
in memory and there are no available running thread request slots available
on the server.  The Cold Fusion Server service must be restarted so that the
running and queued request threads can be cleared.

-[ The Details
CFCACHE uses a client thread request when creating temporary cache pages
that will hang Cold Fusion Server if there are no available execution thread
slots.  An example of this exploit using the default limit of 5 simultaneous
requests would be to send 6 simultaneous page requests to a CFCACHE'd page
which hasn't been loaded into a temporary cache file.  Using CFSTAT, a
utility included with Cold Fusion Server, you can clearly see that the
server has stopped responding to client requests with 5 threads running in
the active thread space and 1 thread stuck in the queue.  The 5 active
threads never timeout or exit and the server never recovers from this hung
state.  The only way to regain control of the server is to restart the Cold
Fusion Server service on the affected machines.

The severity of this bug is fairly high considering that the exploit is so
simple to perform and does not require malformed data, edited packets or any
exploit programs to potentially knock thousands of vulnerable Cold Fusion
Servers off-line.

-[ Patch Availability or Workaround

No known patches, however, you have the choice of avoiding the use of
CFCACHE or a possible workaround would be to manually or programmatically
(spider) CFCACHE pages so that the temporary files are created under a
no-load situation.  Once the temporary cache pages are created, this
vulnerability is no longer a threat.  This workaround is not very practical
however, and can become very time consuming if the website has many pages
using this functionality.

Allaire's Unofficial response to this bug:
"What are the chances that 5 people would simultaneously request the same
page?"

-[ Exploit Published: 05/08/2000
Vendor Notification: 05/08/2000
Release to Public: 05/08/2000

Regards,
Ryan

Ryan Hill, MCSE
Director of Systems Integration
Market Matrix, Inc. - http://www.marketmatrix.com
------------------------------------------------------------------------------
Archives: http://www.eGroups.com/list/cf-talk
To Unsubscribe visit 
http://www.houseoffusion.com/index.cfm?sidebar=lists&body=lists/cf_talk or send a 
message to [EMAIL PROTECTED] with 'unsubscribe' in the body.

Reply via email to