Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-10079

Опубликовано: 22 окт. 2019
Источник: debian
EPSS Низкий

Описание

Apache Traffic Server is vulnerable to HTTP/2 setting flood attacks. Earlier versions of Apache Traffic Server didn't limit the number of setting frames sent from the client using the HTTP/2 protocol. Users should upgrade to Apache Traffic Server 7.1.7, 8.0.4, or later versions.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
trafficserverfixed8.0.5+ds-1package

Примечания

  • https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E

EPSS

Процентиль: 90%
0.05102
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 6 лет назад

Apache Traffic Server is vulnerable to HTTP/2 setting flood attacks. Earlier versions of Apache Traffic Server didn't limit the number of setting frames sent from the client using the HTTP/2 protocol. Users should upgrade to Apache Traffic Server 7.1.7, 8.0.4, or later versions.

CVSS3: 7.5
nvd
больше 6 лет назад

Apache Traffic Server is vulnerable to HTTP/2 setting flood attacks. Earlier versions of Apache Traffic Server didn't limit the number of setting frames sent from the client using the HTTP/2 protocol. Users should upgrade to Apache Traffic Server 7.1.7, 8.0.4, or later versions.

CVSS3: 7.5
github
больше 3 лет назад

Apache Traffic Server is vulnerable to HTTP/2 setting flood attacks. Earlier versions of Apache Traffic Server didn't limit the number of setting frames sent from the client using the HTTP/2 protocol. Users should upgrade to Apache Traffic Server 7.1.7, 8.0.4, or later versions.

CVSS3: 7.5
fstec
больше 6 лет назад

Уязвимость модуля HTTP/2 веб-сервера Apache Traffic Server, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность данных

EPSS

Процентиль: 90%
0.05102
Низкий