Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAGjw+kN1gKKNb3LsKdQNAVk4bkNtr-J6pcQKkXL37xmmvtMyEw@mail.gmail.com>
Date: Wed, 13 Nov 2024 09:59:27 -0700
From: Masakazu Kitajo <maskit@...che.org>
To: announce@...fficserver.apache.org, Dev <dev@...fficserver.apache.org>, 
	users <users@...fficserver.apache.org>, security@...fficserver.apache.org
Cc: oss-security@...ts.openwall.com
Subject: [ANNOUNCE] Apache Traffic Server is vulnerable to specific user inputs

Description:
Apache Traffic Server is vulnerable to specific user inputs

CVE:
CVE-2024-38479 - Cache key plugin is vulnerable to cache poisoning attack
CVE-2024-50305 - Valid Host field value can cause crashes
CVE-2024-50306 - Server process can fail to drop privilege

Reported By:
Bryan Call (CVE-2024-38479)
Masakazu Kitajo (CVE-2024-50305)
Jeffrey BENCTEUX (CVE-2024-50306)

Vendor:
The Apache Software Foundation

Version Affected:
ATS 9.0.0 to 9.2.5 (CVE-2024-38479, CVE-2024-50305, CVE-2024-50306)
ATS 10.0.0 to 10.0.1 (CVE-2024-50306)

Mitigation:
9.x users should upgrade to 9.2.6 or later versions
10.x users should upgrade to 10.0.2 or later versions

CVE:
https://www.cve.org/CVERecord?id=CVE-2024-38479
https://www.cve.org/CVERecord?id=CVE-2024-50305
https://www.cve.org/CVERecord?id=CVE-2024-50306

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.