First published: Mon Oct 30 2017(Updated: )
Apache Traffic Server 5.1.x before 5.1.1 allows remote attackers to bypass access restrictions by leveraging failure to properly tunnel remap requests using CONNECT.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Traffic Server | =5.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2014-3624 is critical with a severity value of 9.8.
Remote attackers can exploit CVE-2014-3624 by bypassing access restrictions through failure to properly tunnel remap requests using CONNECT.
Apache Traffic Server version 5.1.0 is affected by CVE-2014-3624.
To fix CVE-2014-3624, update your Apache Traffic Server installation to version 5.1.1 or later.
You can find more information about CVE-2014-3624 at the following references: [1] [2] [3]