How to mitigate "Slow HTTP POST" vulnerability on CA Access Gateway?
External reference vulnerability details is:
OS: ALL platform
The Apache HTTP Server 1.x and 2.x allows remote attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris, related to the lack of the mod_reqtimeout module in versions before 2.2.15.
CA Access Gateway: 12.7.02, which has upgraded Apache Tomcat 7.0.82.
Apache HTTP Server is upgraded to Apache HTTP Server 2.4.29.
Which is not affected by CVE-2007-6750 Slow HTTP POST vulnerability.
This vulnerability is not caused by any CA Access Gateway code changes or configuration changes inside the SSO product. Due to large amount of open source vulnerabilities updated in periodical basis, Standard SSO documentation can not realistically cover all 3rd party vulnerabilities security community has discovered.
This is purely an apache defect, apache.org addressed this bug by changing the code in apache and suggested modifications to httpd.conf.
Customer should follow the advice to change apache configuration from httpd.conf, including something like:
RequestReadTimeout header=20-40,MinRate=500 body=20-40,MinRate=500
Earlier release of CA proxy server may have older version apache than 2.2.15, then those releases will not have mod_reqtimeout.c built-in, thus the steps here will not apply. Customer should upgrade CA proxy server to later release.