CVE-2017-7671

There is a DOS attack vulnerability in Apache Traffic Server (ATS) 5.2.0 to 5.3.2, 6.0.0 to 6.2.0, and 7.0.0 with the TLS handshake. This issue can cause the server to coredump.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:traffic_server:7.0.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:32

Type Values Removed Values Added
References () https://lists.apache.org/thread.html/203bdcf9bbb718f3dc6f7aaf3e2af632474d51fa9e7bfb7832729905%40%3Cdev.trafficserver.apache.org%3E - () https://lists.apache.org/thread.html/203bdcf9bbb718f3dc6f7aaf3e2af632474d51fa9e7bfb7832729905%40%3Cdev.trafficserver.apache.org%3E -
References () https://www.debian.org/security/2018/dsa-4128 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4128 - Third Party Advisory

Information

Published : 2018-02-27 20:29

Updated : 2024-11-21 03:32


NVD link : CVE-2017-7671

Mitre link : CVE-2017-7671

CVE.ORG link : CVE-2017-7671


JSON object : View

Products Affected

debian

  • debian_linux

apache

  • traffic_server
CWE
CWE-20

Improper Input Validation