Apache Traffic Server is vulnerable to HTTP/2 setting flood attacks. Earlier versions of Apache Traffic Server didn't limit the number of setting frames sent from the client using the HTTP/2 protocol. Users should upgrade to Apache Traffic Server 7.1.7, 8.0.4, or later versions.
References
Link | Resource |
---|---|
https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E | Mailing List Patch Third Party Advisory |
https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E | Mailing List Patch Third Party Advisory |
https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E | Mailing List Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2019-10-22 09:15
Updated : 2022-01-01 12:11
NVD link : CVE-2019-10079
Mitre link : CVE-2019-10079
JSON object : View
CWE
CWE-770
Allocation of Resources Without Limits or Throttling
Products Affected
apache
- traffic_server