First published: Wed Aug 29 2018(Updated: )
Adding method ACLs in remap.config can cause a segfault when the user makes a carefully crafted request. This affects versions Apache Traffic Server (ATS) 6.0.0 to 6.2.2 and 7.0.0 to 7.1.3. To resolve this issue users running 6.x should upgrade to 6.2.3 or later versions and 7.x users should upgrade to 7.1.4 or later versions.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/trafficserver | 8.0.2+ds-1+deb10u6 8.1.7-0+deb10u2 8.1.7+ds-1~deb11u1 9.2.0+ds-2+deb12u1 9.2.2+ds-1 | |
Apache Traffic Server | >=6.0.0<=6.2.2 | |
Apache Traffic Server | >=7.0.0<=7.1.3 | |
Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1318 has a high severity rating due to the potential for a segmentation fault caused by user-crafted requests.
To fix CVE-2018-1318, users should upgrade Apache Traffic Server to version 6.2.3 or later for 6.x versions and to version 7.1.4 or later for 7.x versions.
CVE-2018-1318 affects Apache Traffic Server versions from 6.0.0 to 6.2.2 and 7.0.0 to 7.1.3.
If CVE-2018-1318 is not addressed, it may lead to service disruption through segmentation faults in Apache Traffic Server.
CVE-2018-1318 is specifically noted to impact Apache Traffic Server installations, which can run on various operating systems including Debian.