Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-7670

Опубликовано: 10 июл. 2017
Источник: nvd
CVSS3: 7.5
CVSS2: 5
EPSS Низкий

Описание

The Traffic Router component of the incubating Apache Traffic Control project is vulnerable to a Slowloris style Denial of Service attack. TCP connections made on the configured DNS port will remain in the ESTABLISHED state until the client explicitly closes the connection or Traffic Router is restarted. If connections remain in the ESTABLISHED state indefinitely and accumulate in number to match the size of the thread pool dedicated to processing DNS requests, the thread pool becomes exhausted. Once the thread pool is exhausted, Traffic Router is unable to service any DNS request, regardless of transport protocol.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:apache:traffic_control:*:*:*:*:*:*:*:*
Версия до 1.8.0 (включая)
cpe:2.3:a:apache:traffic_control:1.8.1:rc0:*:*:*:*:*:*
cpe:2.3:a:apache:traffic_control:2.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:apache:traffic_control:2.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:apache:traffic_control:2.0.0:rc3:*:*:*:*:*:*
cpe:2.3:a:apache:traffic_control:2.0.0:rc4:*:*:*:*:*:*
cpe:2.3:a:apache:traffic_control:2.0.0:rc5:*:*:*:*:*:*
cpe:2.3:a:apache:traffic_control:2.0.0:rc6:*:*:*:*:*:*

EPSS

Процентиль: 82%
0.01728
Низкий

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-400

Связанные уязвимости

CVSS3: 7.5
github
больше 3 лет назад

Apache Traffic Control vulnerable to Slowloris-style Denial of Service attack

EPSS

Процентиль: 82%
0.01728
Низкий

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-400