You are viewing a plain text version of this content. The canonical link for it is here.
Posted to announce@trafficserver.apache.org by Bryan Call <bc...@apache.org> on 2018/02/27 18:31:15 UTC

[ANNOUNCE] Apache Traffic Server vulnerability with TLS handshake - CVE-2017-7671

CVE-2017-7671: Apache Traffic Server vulnerability with TLS handshake

Vendor:
The Apache Software Foundation

Version Affected:
ATS 5.2.0 to 5.3.2
ATS 6.0.0 to 6.2.0
ATS 7.0.0

Description:
There is a DOS attack vulnerability in ATS with the TLS handshake.  This issue can cause the server to coredump.

Mitigation:
5.x users should upgrade to 7.1.2 or later versions
6.x users should upgrade to 6.2.2 or later versions
7.x users should upgrade to 7.1.2 or later versions

References:
	Downloads:
		https://trafficserver.apache.org/downloads
	Github Pull Request:
		https://github.com/apache/trafficserver/pull/1941
	CVE:
		https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7671

-Bryan