You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@trafficserver.apache.org by Bryan Call <bc...@apache.org> on 2021/06/24 23:00:02 UTC
[ANNOUNCE] Apache Traffic Server is vulnerable to various HTTP/1.x
and HTTP/2 attacks
Description:
ATS is vulnerable to various HTTP/1.x and HTTP/2 attacks
CVE:
CVE-2021-27577 Incorrect handling of url fragment leads to cache poisoning
CVE-2021-32565 HTTP Request Smuggling, content length with invalid charters
CVE-2021-32566 Specific sequence of HTTP/2 frames can cause ATS to crash
CVE-2021-32567 Reading HTTP/2 frames too many times
CVE-2021-35474 Dynamic stack buffer overflow in cachekey plugin
Reported By:
Katsutoshi Ikenoya (CVE-2021-32566)
Mattias Grenfeldt (CVE-2021-32565)
Iustin Ladunca (CVE-2021-27577)
Masaori Koshiba (CVE-2021-32567, CVE-2021-35474)
Vendor:
The Apache Software Foundation
Version Affected:
ATS 7.0.0 to 7.1.12
ATS 8.0.0 to 8.1.1
ATS 9.0.0 to 9.0.1
Mitigation:
7.x users should upgrade to 8.1.2 or 9.0.2, or later versions
8.x users should upgrade to 8.1.2 or later versions
9.x users should upgrade to 9.0.2 or later versions
References:
Downloads:
https://trafficserver.apache.org/downloads
(Please use backup sites from the link only if the mirrors are unavailable)
CVE:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474
-Bryan