Vulnerability Note VU#938151
Forwarding Loop Attacks in Content Delivery Networks may result in denial of service
Content Delivery Networks (CDNs) may in some scenarios be manipulated into a forwarding loop, which consumes server resources and causes a denial of service (DoS) on the network.
CWE-400: Uncontrolled Resource Consumption ('Resource Exhaustion')
Content Delivery Networks (CDNs) are used to improve website performance and scalability by connecting a user to geographically nearby server for content. CDNs typically operate in two modes, a "push" mode allowing a user to upload content to the CDN for later distribution, or a "pull" mode which effectively acts as a reverse proxy.
A remote attacker may be able to create a denial of service condition in CDNs, preventing access to hosted content.
The researchers and CERT have reached out to known affected CDNs to inform them of this attack. CDNs are implementing their own counter-measures to this attack. If you are an employee of a CDN, the CERT/CC encourages you to review the researcher's conference paper to determine if your CDN may be impacted.
Vendor Information (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Akamai Technologies, Inc.||Affected||-||04 Mar 2016|
|CDNsun||Affected||27 Dec 2015||04 Jan 2016|
|OnApp||Affected||-||29 Feb 2016|
CVSS Metrics (Learn More)
Thanks to Jianjun Chen and Jian Jiang for reporting this vulnerability.
This document was written by Garret Wassermann.
- CVE IDs: Unknown
- Date Public: 24 Feb 2016
- Date First Published: 29 Feb 2016
- Date Last Updated: 04 Mar 2016
- Document Revision: 32
If you have feedback, comments, or additional information about this vulnerability, please send us email.