First published: Mon Mar 23 2020(Updated: )
There is a vulnerability in Apache Traffic Server 6.0.0 to 6.2.3, 7.0.0 to 7.1.8, and 8.0.0 to 8.0.5 with a smuggling attack and chunked encoding. Upgrade to versions 7.1.9 and 8.0.6 or later versions.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/trafficserver | 8.0.2+ds-1+deb10u6 8.1.7-0+deb10u2 8.1.7+ds-1~deb11u1 9.2.0+ds-2+deb12u1 9.2.2+ds-1 | |
Apache Traffic Server | >=6.0.0<=6.2.3 | |
Apache Traffic Server | >=7.0.0<=7.1.8 | |
Apache Traffic Server | >=8.0.0<=8.0.5 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-17565 is a vulnerability in Apache Traffic Server 6.0.0 to 6.2.3, 7.0.0 to 7.1.8, and 8.0.0 to 8.0.5 with a smuggling attack and chunked encoding.
CVE-2019-17565 has a severity level of 9.8 (critical).
The versions of Apache Traffic Server affected by CVE-2019-17565 are 6.0.0 to 6.2.3, 7.0.0 to 7.1.8, and 8.0.0 to 8.0.5.
To fix CVE-2019-17565, upgrade to versions 7.1.9 and 8.0.6 or later versions of Apache Traffic Server.
Yes, you can find references for CVE-2019-17565 [here](https://lists.apache.org/thread.html/r99d18d0bc4daa05e7d0e5a63e0e22701a421b2ef5a8f4f7694c43869%40%3Cannounce.trafficserver.apache.org%3E), [here](https://www.debian.org/security/2020/dsa-4672), and [here](https://github.com/apache/trafficserver/commit/60e0a8ce23d390b851873e020483d6f75e857158).