Is the ProxySG appliance vulnerable to CVE-2011-3192 - Range header DoS vulnerability Apache HTTPD 1.3/2.x?
The ProxySG appliance is not vulnerable because it does not use Apache.
A vulnerable Apache host that is reverse-proxied by ProxySG can be protected by activating client limits in attack-detection.
To enable client limits in attack-detection, use the following CLI command:
xxx.xxx.xxx.xxx - Blue Coat SG>en
Enable Password:
xxx.xxx.xxx.xxx - Blue Coat SG#configure terminal
Enter configuration commands, one per line. End with CTRL-Z.
xxx.xxx.xxx.xxx - Blue Coat SG#(config)attack-detection
xxx.xxx.xxx.xxx - Blue Coat SG#(config attack-detection)client
xxx.xxx.xxx.xxx - Blue Coat SG#(config client)enable-limits
To disable client limits in attack_detection, enter the following command:
xxx.xxx.xxx.xxx - Blue Coat SG#(config client)disable-limits