First published: Mon Mar 23 2020(Updated: )
There is a vulnerability in Apache Traffic Server 6.0.0 to 6.2.3, 7.0.0 to 7.1.8, and 8.0.0 to 8.0.5 with a smuggling attack and Transfer-Encoding and Content length headers. Upgrade to versions 7.1.9 and 8.0.6 or later versions.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/trafficserver | 8.0.2+ds-1+deb10u6 8.1.7-0+deb10u2 8.1.7+ds-1~deb11u1 9.2.0+ds-2+deb12u1 9.2.2+ds-1 | |
Apache Traffic Server | >=6.0.0<=6.2.3 | |
Apache Traffic Server | >=7.0.0<=7.1.8 | |
Apache Traffic Server | >=8.0.0<=8.0.5 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1944 is a vulnerability in Apache Traffic Server 6.0.0 to 6.2.3, 7.0.0 to 7.1.8, and 8.0.0 to 8.0.5 with a smuggling attack and Transfer-Encoding and Content length headers.
CVE-2020-1944 has a severity rating of 9.8 (critical).
To fix CVE-2020-1944, upgrade to versions 7.1.9 and 8.0.6 or later versions.
You can find more information about CVE-2020-1944 at the following references: [Link 1](https://lists.apache.org/thread.html/r99d18d0bc4daa05e7d0e5a63e0e22701a421b2ef5a8f4f7694c43869%40%3Cannounce.trafficserver.apache.org%3E), [Link 2](https://www.debian.org/security/2020/dsa-4672), [Link 3](https://github.com/apache/trafficserver/commit/5830bc72611e85e7a31098ce86710242f29076dc).
The Common Weakness Enumeration (CWE) ID for CVE-2020-1944 is CWE-444.