You are viewing a plain text version of this content. The canonical link for it is here.
Posted to users@trafficserver.apache.org by Bryan Call <bc...@apache.org> on 2018/02/27 18:31:15 UTC
[ANNOUNCE] Apache Traffic Server vulnerability with TLS handshake -
CVE-2017-7671
CVE-2017-7671: Apache Traffic Server vulnerability with TLS handshake
Vendor:
The Apache Software Foundation
Version Affected:
ATS 5.2.0 to 5.3.2
ATS 6.0.0 to 6.2.0
ATS 7.0.0
Description:
There is a DOS attack vulnerability in ATS with the TLS handshake. This issue can cause the server to coredump.
Mitigation:
5.x users should upgrade to 7.1.2 or later versions
6.x users should upgrade to 6.2.2 or later versions
7.x users should upgrade to 7.1.2 or later versions
References:
Downloads:
https://trafficserver.apache.org/downloads
Github Pull Request:
https://github.com/apache/trafficserver/pull/1941
CVE:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7671
-Bryan