Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <0328E5ED-8D75-4C17-99A6-5D65B3AF4E5E@apache.org>
Date: Tue, 27 Feb 2018 09:38:23 -0800
From: Bryan Call <bcall@...che.org>
To: dev <dev@...fficserver.apache.org>,
 users <users@...fficserver.apache.org>,
 announce@...fficserver.apache.org,
 security@...fficserver.apache.org,
 oss-security@...ts.openwall.com
Subject: [ANNOUNCE] Apache Traffic Server host header and line folding -
 CVE-2017-5660

CVE-2017-5660: Apache Traffic Server host header and line folding

Vendor:
The Apache Software Foundation

Version Affected:
ATS 6.2.0 and prior
ATS 7.0.0 and prior

Description:
There is a vulnerability in ATS with the Host header and line folding.  This can have issues when interacting with upstream proxies and the wrong host being used.

Mitigation:
6.2.x users should upgrade to 6.2.2 or later versions
7.x users should upgrade to 7.1.2 or later versions

References:
	Downloads:
		https://trafficserver.apache.org/downloads

	Github Pull Request:
		https://github.com/apache/trafficserver/pull/1657

	CVE:
		https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5660

-Bryan



Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.